[go: up one dir, main page]

CN102073236B - Unit using operating system and image forming apparatus using the same - Google Patents

Unit using operating system and image forming apparatus using the same Download PDF

Info

Publication number
CN102073236B
CN102073236B CN201010557633.4A CN201010557633A CN102073236B CN 102073236 B CN102073236 B CN 102073236B CN 201010557633 A CN201010557633 A CN 201010557633A CN 102073236 B CN102073236 B CN 102073236B
Authority
CN
China
Prior art keywords
cpu
information
imaging device
unit
replaceable units
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201010557633.4A
Other languages
Chinese (zh)
Other versions
CN102073236A (en
Inventor
李在成
李允太
赵原逸
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hewlett Packard Development Co LP
Original Assignee
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=41094676&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=CN102073236(B) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Samsung Electronics Co Ltd filed Critical Samsung Electronics Co Ltd
Publication of CN102073236A publication Critical patent/CN102073236A/en
Application granted granted Critical
Publication of CN102073236B publication Critical patent/CN102073236B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00002Diagnosis, testing or measuring; Detecting, analysing or monitoring not otherwise provided for
    • H04N1/00007Diagnosis, testing or measuring; Detecting, analysing or monitoring not otherwise provided for relating to particular apparatus or devices
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G03PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
    • G03GELECTROGRAPHY; ELECTROPHOTOGRAPHY; MAGNETOGRAPHY
    • G03G15/00Apparatus for electrographic processes using a charge pattern
    • G03G15/06Apparatus for electrographic processes using a charge pattern for developing
    • G03G15/08Apparatus for electrographic processes using a charge pattern for developing using a solid developer, e.g. powder developer
    • G03G15/0822Arrangements for preparing, mixing, supplying or dispensing developer
    • G03G15/0863Arrangements for preparing, mixing, supplying or dispensing developer provided with identifying means or means for storing process- or use parameters, e.g. an electronic memory
    • GPHYSICS
    • G03PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
    • G03GELECTROGRAPHY; ELECTROPHOTOGRAPHY; MAGNETOGRAPHY
    • G03G15/00Apparatus for electrographic processes using a charge pattern
    • G03G15/50Machine control of apparatus for electrographic processes using a charge pattern, e.g. regulating differents parts of the machine, multimode copiers, microprocessor control
    • G03G15/5066Machine control of apparatus for electrographic processes using a charge pattern, e.g. regulating differents parts of the machine, multimode copiers, microprocessor control by using information from an external support, e.g. magnetic card
    • GPHYSICS
    • G03PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
    • G03GELECTROGRAPHY; ELECTROPHOTOGRAPHY; MAGNETOGRAPHY
    • G03G15/00Apparatus for electrographic processes using a charge pattern
    • G03G15/50Machine control of apparatus for electrographic processes using a charge pattern, e.g. regulating differents parts of the machine, multimode copiers, microprocessor control
    • G03G15/5075Remote control machines, e.g. by a host
    • GPHYSICS
    • G03PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
    • G03GELECTROGRAPHY; ELECTROPHOTOGRAPHY; MAGNETOGRAPHY
    • G03G21/00Arrangements not provided for by groups G03G13/00 - G03G19/00, e.g. cleaning, elimination of residual charge
    • G03G21/16Mechanical means for facilitating the maintenance of the apparatus, e.g. modular arrangements
    • G03G21/18Mechanical means for facilitating the maintenance of the apparatus, e.g. modular arrangements using a processing cartridge, whereby the process cartridge comprises at least two image processing means in a single unit
    • G03G21/1875Mechanical means for facilitating the maintenance of the apparatus, e.g. modular arrangements using a processing cartridge, whereby the process cartridge comprises at least two image processing means in a single unit provided with identifying means or means for storing process- or use parameters, e.g. lifetime of the cartridge
    • G03G21/1878Electronically readable memory
    • G03G21/1889Electronically readable memory for auto-setting of process parameters, lifetime, usage
    • GPHYSICS
    • G03PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
    • G03GELECTROGRAPHY; ELECTROPHOTOGRAPHY; MAGNETOGRAPHY
    • G03G21/00Arrangements not provided for by groups G03G13/00 - G03G19/00, e.g. cleaning, elimination of residual charge
    • G03G21/16Mechanical means for facilitating the maintenance of the apparatus, e.g. modular arrangements
    • G03G21/18Mechanical means for facilitating the maintenance of the apparatus, e.g. modular arrangements using a processing cartridge, whereby the process cartridge comprises at least two image processing means in a single unit
    • G03G21/1875Mechanical means for facilitating the maintenance of the apparatus, e.g. modular arrangements using a processing cartridge, whereby the process cartridge comprises at least two image processing means in a single unit provided with identifying means or means for storing process- or use parameters, e.g. lifetime of the cartridge
    • G03G21/1878Electronically readable memory
    • G03G21/1892Electronically readable memory for presence detection, authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • G06F21/608Secure printing
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K15/00Arrangements for producing a permanent visual presentation of the output data, e.g. computer output printers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/4406Restricting access, e.g. according to user identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/4406Restricting access, e.g. according to user identity
    • H04N1/4426Restricting access, e.g. according to user identity involving separate means, e.g. a server, a magnetic card
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/4406Restricting access, e.g. according to user identity
    • H04N1/4433Restricting access, e.g. according to user identity to an apparatus, part of an apparatus or an apparatus function
    • GPHYSICS
    • G03PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
    • G03GELECTROGRAPHY; ELECTROPHOTOGRAPHY; MAGNETOGRAPHY
    • G03G15/00Apparatus for electrographic processes using a charge pattern
    • G03G15/55Self-diagnostics; Malfunction or lifetime display
    • G03G15/553Monitoring or warning means for exhaustion or lifetime end of consumables, e.g. indication of insufficient copy sheet quantity for a job
    • GPHYSICS
    • G03PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
    • G03GELECTROGRAPHY; ELECTROPHOTOGRAPHY; MAGNETOGRAPHY
    • G03G2215/00Apparatus for electrophotographic processes
    • G03G2215/00025Machine control, e.g. regulating different parts of the machine
    • G03G2215/00109Remote control of apparatus, e.g. by a host
    • GPHYSICS
    • G03PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
    • G03GELECTROGRAPHY; ELECTROPHOTOGRAPHY; MAGNETOGRAPHY
    • G03G2215/00Apparatus for electrophotographic processes
    • G03G2215/06Developing structures, details
    • G03G2215/066Toner cartridge or other attachable and detachable container for supplying developer material to replace the used material
    • G03G2215/0695Toner cartridge or other attachable and detachable container for supplying developer material to replace the used material using identification means or means for storing process or use parameters
    • G03G2215/0697Toner cartridge or other attachable and detachable container for supplying developer material to replace the used material using identification means or means for storing process or use parameters being an electronically readable memory
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2129Authenticate client device independently of the user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Mathematical Physics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Biomedical Technology (AREA)
  • Power Engineering (AREA)
  • Technology Law (AREA)
  • Control Or Security For Electrophotography (AREA)
  • Accessory Devices And Overall Control Thereof (AREA)
  • Studio Devices (AREA)
  • Electrophotography Configuration And Component (AREA)
  • Facsimiles In General (AREA)
  • Storage Device Security (AREA)
  • Facsimile Transmission Control (AREA)

Abstract

本发明提供一种使用操作系统的单元和使用该单元的成像设备。一种可安装在用户可更换单元监控(CRUM)单元上的芯片,所述CRUM单元用于成像设备,所述芯片包括:中央处理单元(CPU),使用自己的操作系统(OS)执行与成像设备的主体的加密数据通信。由此,可增强安装有所述芯片的单元的安全性,并且可防止所述单元的数据的随意改变。

The present invention provides a unit using an operating system and an image forming apparatus using the same. A chip mountable on a customer replaceable unit monitor (CRUM) unit for an imaging device, the chip includes a central processing unit (CPU) that uses its own operating system (OS) to execute and image Encrypted data communication of the main body of the device. Thereby, the security of the unit mounted with the chip can be enhanced, and arbitrary change of data of the unit can be prevented.

Description

使用操作系统的单元和使用该单元的成像设备Unit using the operating system and imaging device using the same

本申请是申请日为2009年3月2日、申请号为200910007789.2、发明名称为“使用操作系统的单元和使用该单元的成像设备”的发明专利申请的分案申请。This application is a divisional application of an invention patent application with an application date of March 2, 2009, an application number of 200910007789.2, and an invention title of "a unit using an operating system and an imaging device using the unit".

技术领域 technical field

本发明总体构思涉及一种包括内置的中央处理单元(CPU)的单元和使用该单元的成像设备。更具体地讲,本发明总体构思涉及一种通过包含具有操作系统(OS)的CPU而变得更安全的单元以及使用该单元的成像设备。The present general inventive concept relates to a unit including a built-in central processing unit (CPU) and an image forming apparatus using the same. More particularly, the present general inventive concept relates to a unit made more secure by including a CPU having an operating system (OS), and an image forming apparatus using the same.

背景技术 Background technique

随着计算机被广泛地使用,外围设备也变得普遍。外围设备的示例是成像设备,例如,打印机、扫描仪、复印机和多功能装置。As computers have become more widely used, peripheral devices have also become common. Examples of peripheral devices are image forming devices such as printers, scanners, copiers, and multifunction devices.

成像设备使用墨或调色剂将图像打印到纸上。每当执行成像操作时就使用墨和调色剂,直到墨或调色剂最终耗尽。如果缺少墨或调色剂,则用户必须更换用于存储墨或调色剂的单元。这些在使用成像设备时可更换的组件被称为耗材或可更换单元。An imaging device uses ink or toner to print an image onto paper. Ink and toner are used whenever an image forming operation is performed until the ink or toner is finally exhausted. If the ink or toner is lacking, the user must replace the unit for storing the ink or toner. These components that can be replaced while using the imaging device are called consumables or replaceable units.

在可更换单元中,除了墨或调色剂耗尽时不得不更换的单元之外的一些单元在使用预定的时间段之后必须被更换。由于在预定的时间段之后这些单元的性质改变并且打印质量因此下降,所以即使墨或调色剂没有耗尽,也必须更换这些单元。Among the replaceable units, some units other than those that have to be replaced when ink or toner is exhausted must be replaced after being used for a predetermined period of time. Since the properties of these units change after a predetermined period of time and the print quality decreases accordingly, these units must be replaced even if the ink or toner is not exhausted.

例如,激光成像设备包括充电单元、转印单元、定影单元等,在每个单元中使用的不同类型的辊和带由于使用超过限定的寿命而可能用坏或损坏。结果,打印质量会显著地下降。因此,用户不得不在合适的时间更换这样的可更换单元。For example, a laser image forming apparatus includes a charging unit, a transfer unit, a fixing unit, etc., and different types of rollers and belts used in each unit may wear out or be damaged due to use beyond a limited lifetime. As a result, print quality may be significantly reduced. Therefore, the user has to replace such replaceable units at an appropriate time.

可利用使用状态指标(use state index)来确定更换可更换单元的时间。使用状态指标表示用于指示成像设备的使用程度的指标,例如,成像设备打印的纸的页数以及形成图像的点的数量。成像设备可通过测量成像设备打印的纸的页数或点的数量来确定更换可更换单元的时间。A use state index can be utilized to determine when to replace a replaceable unit. The usage state index represents an index indicating the degree of use of the image forming apparatus, for example, the number of sheets of paper printed by the image forming apparatus and the number of dots forming an image. The image forming apparatus may determine when to replace the replaceable unit by measuring the number of pages or the number of dots printed by the image forming apparatus.

近来,为了使用户精确地确定更换每个可更换单元的时间,每个可更换单元包括内置的用户可更换单元监控存储器(CRUM存储器)。每个可更换单元的使用状态指标被存储在CRUM存储器中。因此,即使每个可更换单元被分离并使用在不同的成像设备中,每个可更换单元的使用状态也可被精确地确定。Recently, in order for a user to accurately determine when to replace each replaceable unit, each replaceable unit includes a built-in customer replaceable unit monitor memory (CRUM memory). A usage status indicator for each replaceable unit is stored in CRUM memory. Therefore, even if each replaceable unit is separated and used in a different image forming apparatus, the use state of each replaceable unit can be accurately determined.

然而,具有CRUM存储器的传统可更换单元具有用户能够容易地访问CRUM存储器的问题。存储在CRUM存储器中的信息从关于制造商的基本信息到关于最近使用状态的信息有很大的不同。如果修改该信息,则难以享受售后服务和计算更换可更换单元的合适时间。具体地说,如果关于制造商的信息被修改,则不能确定关于制造商的信息是否可信,因此,难以管理可更换单元。However, a conventional replaceable unit having a CRUM memory has a problem that a user can easily access the CRUM memory. The information stored in CRUM memory varies greatly from basic information about the manufacturer to information about the state of recent use. If this information is modified, it will be difficult to enjoy after-sales service and calculate an appropriate time to replace the replaceable unit. Specifically, if the information on the manufacturer is modified, it cannot be determined whether the information on the manufacturer is authentic, and therefore, it is difficult to manage the replaceable units.

发明内容 Contents of the invention

本发明总体构思提供一种通过具有内置的CPU而变得更加安全的单元,所述CPU具有自己的操作系统(OS),还提供一种具有该单元的成像设备。The present general inventive concept provides a unit which becomes more secure by having a built-in CPU having its own operating system (OS), and an image forming apparatus having the same.

将在接下来的描述中部分阐述本发明总体构思的另外的特点和效用,还有一部分通过描述将是清楚的,或者可以经过本发明总体构思的实施而得知。Additional characteristics and utility of the general concept of the present invention will be partly set forth in the following description, and some parts will be clear from the description, or can be known through the practice of the general concept of the present invention.

可通过提供一种可安装在用于成像设备的可更换单元上的芯片来实现本发明总体构思的实施例,所述芯片包括:中央处理单元(CPU),具有自己的操作系统(OS),所述OS与成像设备的OS分开,从而所述CPU使用自己的OS来执行与成像设备的主体的加密数据通信。Embodiments of the present general inventive concept can be realized by providing a chip mountable on a replaceable unit for an image forming apparatus, the chip comprising: a central processing unit (CPU) with its own operating system (OS), The OS is separated from the OS of the imaging device, so that the CPU uses its own OS to perform encrypted data communication with the main body of the imaging device.

所述CPU可独立于成像设备的主体使用自己的OS执行初始化。The CPU can perform initialization using its own OS independently of the main body of the imaging device.

所述CPU可执行所述加密数据通信,使得当包括数据和第一消息认证码(MAC)信息的通信消息从成像设备的主体被发送时,所述CPU通过将密钥和加密算法应用于发送的通信消息的数据部分来产生第二MAC信息,并且当产生的第二MAC与发送的通信消息的第一MAC信息进行比较并与所述第一MAC信息一致时,产生的第二MAC被认为是有效的通信消息并被处理。The CPU may perform the encrypted data communication such that when a communication message including data and first message authentication code (MAC) information is transmitted from the main body of the image forming apparatus, the CPU transmits the encrypted data by applying a key and an encryption algorithm The data portion of the communication message to generate the second MAC information, and when the generated second MAC is compared with the first MAC information of the transmitted communication message and is consistent with the first MAC information, the generated second MAC is considered to be is a valid communication message and is processed.

当成像设备开启时,或者当具有所述芯片的可更换单元被安装在成像设备上时,所述CPU可根据自己的OS执行初始化,所述CPU可在初始化被完成之前对来自成像设备的主体的命令不进行响应,并且当初始化被完成时,所述CPU可执行加密数据通信。When the imaging device is turned on, or when a replaceable unit having the chip is mounted on the imaging device, the CPU may perform initialization according to its own OS, and the CPU may perform initialization from the main body of the imaging device before the initialization is completed. The command does not respond, and when initialization is completed, the CPU can perform encrypted data communication.

所述芯片还可包括:存储单元,存储关于所述芯片、用户可更换单元监控(CRUM)单元、具有所述CRUM单元的可更换单元以及所述CPU的OS中的至少一个的信息。The chip may further include a storage unit storing information on at least one of the chip, a customer replaceable unit monitor (CRUM) unit, a replaceable unit having the CRUM unit, and an OS of the CPU.

所述CPU的OS可驱动所述芯片、CRUM单元以及可更换单元中的至少一个,所述CPU的OS可以是一种软件,所述软件执行下列中的至少一个:独立地对所述芯片、CRUM单元以及可更换单元的一个状态进行初始化的初始化操作;执行公共加密算法的处理操作;以及与成像设备的主体的相互认证操作。The OS of the CPU can drive at least one of the chip, the CRUM unit and the replaceable unit, and the OS of the CPU can be a kind of software, and the software executes at least one of the following: independently operating the chip, An initialization operation of initializing a state of the CRUM unit and the replaceable unit; a processing operation of executing a public encryption algorithm; and a mutual authentication operation with the main body of the imaging device.

所述芯片还可包括:篡改检测器,对物理窃用尝试进行响应;以及密码机单元,通过应用多种加密算法中的预设加密算法,允许所述CPU执行与成像设备的主体的加密数据通信。The chip may further include: a tamper detector responding to a physical tampering attempt; and a cipher unit allowing the CPU to perform encrypted data communication with a main body of the imaging device by applying a preset encryption algorithm among a plurality of encryption algorithms .

应用于加密数据通信的加密算法是可改变的。The encryption algorithm used to encrypt data communications is variable.

所述CPU可从成像设备的主体接收当执行成像作业时用于成像作业的耗材的程度的值,并且所述CPU将所述值与存储在存储单元中的关于耗材使用的信息相加,然后刷新存储在存储单元中的关于耗材使用的信息。The CPU may receive, from a main body of the image forming apparatus, a value of a degree of consumables used for an image forming job when the image forming job is performed, and the CPU may add the value to information on use of consumables stored in a storage unit, and then Refreshes the information on the usage of consumables stored in the memory unit.

可通过提供一种能够用于成像作业的CRUM单元来实现本发明总体构思的实施例,所述CRUM单元包括:存储单元,存储关于安装有CRUM单元的单元的信息;以及CPU,使用自己的操作系统(OS)管理存储单元,并且执行与成像设备的主体的加密数据通信,所述CPU的OS与成像设备的OS分开。Embodiments of the present general inventive concept can be realized by providing a CRUM unit capable of being used for an image forming job, the CRUM unit including: a storage unit storing information on a unit in which the CRUM unit is installed; and a CPU using its own operation A system (OS) manages the storage unit and performs encrypted data communication with the main body of the image forming apparatus, the OS of the CPU being separate from the OS of the image forming apparatus.

所述CPU可独立于成像设备的主体使用自己的OS执行初始化。The CPU can perform initialization using its own OS independently of the main body of the imaging device.

所述CPU的OS可驱动CRUM单元或安装有所述CRUM单元的可更换单元,所述CPU的OS可以是一种软件,所述软件执行下列中的至少一个:独立地对所述CRUM单元或所述可更换单元的状态进行初始化的初始化操作;执行公共加密算法的处理操作;以及与成像设备的主体的相互认证操作。The OS of the CPU can drive the CRUM unit or the replaceable unit installed with the CRUM unit, and the OS of the CPU can be a kind of software that executes at least one of the following: independently operating the CRUM unit or An initialization operation of initializing the state of the replaceable unit; a processing operation of executing a common encryption algorithm; and a mutual authentication operation with a main body of the imaging device.

所述CPU可执行所述加密数据通信,使得当包括数据和第一消息认证码(MAC)信息的通信消息从成像设备的主体被发送时,所述CPU通过将密钥和加密算法应用于发送的通信消息的数据部分来产生第二MAC,并且当产生的第二MAC与发送的通信消息的第一MAC信息进行比较并与所述第一MAC信息一致时,产生的第二MAC被认为是有效的通信消息并被处理。The CPU may perform the encrypted data communication such that when a communication message including data and first message authentication code (MAC) information is transmitted from the main body of the image forming apparatus, the CPU transmits the encrypted data by applying a key and an encryption algorithm The data portion of the communication message to generate the second MAC, and when the generated second MAC is compared with the first MAC information of the sent communication message and is consistent with the first MAC information, the generated second MAC is considered to be Valid communication messages are processed.

当成像设备开启时,或者当具有所述CRUM单元的可更换单元被安装在成像设备上时,所述CPU可根据自己的OS执行初始化,并且在初始化被完成之前对来自成像设备的主体的命令不进行响应。When the imaging device is turned on, or when a replaceable unit having the CRUM unit is mounted on the imaging device, the CPU may perform initialization according to its own OS, and respond to commands from the main body of the imaging device before the initialization is completed. Do not respond.

CRUM单元还可包括:接口单元,将成像设备连接到所述CPU;篡改检测器,对物理窃用尝试进行响应;以及密码机单元,通过应用多种加密算法中的预设加密算法,允许所述CPU执行与成像设备的主体的加密数据通信。The CRUM unit may further include: an interface unit that connects the imaging device to the CPU; a tamper detector that responds to a physical tampering attempt; and a cipher unit that allows the The CPU performs encrypted data communication with the main body of the imaging device.

应用于加密数据通信的加密算法是可改变的。The encryption algorithm used to encrypt data communications is variable.

所述CPU可从成像设备的主体接收当执行成像作业时用于成像作业的耗材的程度的值,并且所述CPU将所述值与存储在存储单元中的关于耗材使用的信息相加,然后刷新存储在存储单元中的关于耗材使用的信息。The CPU may receive, from a main body of the image forming apparatus, a value of a degree of consumables used for an image forming job when the image forming job is performed, and the CPU may add the value to information on use of consumables stored in a storage unit, and then Refreshes the information on the usage of consumables stored in the memory unit.

可通过提供一种可安装在成像设备中以用于成像作业的可更换单元来实现本发明总体构思的实施例,所述可更换单元包括:存储单元,存储关于可更换单元的信息;以及CPU,使用自己的操作系统(OS)管理存储单元,并且执行与成像设备的主体的加密数据通信,所述CPU的OS与成像设备的OS分开。Embodiments of the present general inventive concept can be realized by providing a replaceable unit installable in an image forming apparatus for an image forming job, the replaceable unit including: a storage unit storing information on the replaceable unit; and a CPU , manages the storage unit using its own operating system (OS), which is separate from the OS of the imaging device, and performs encrypted data communication with the main body of the imaging device.

所述CPU可独立于成像设备的主体使用自己的OS执行初始化。The CPU can perform initialization using its own OS independently of the main body of the imaging device.

所述CPU的OS可驱动可更换单元,所述CPU的OS可以是一种软件,所述软件执行下列中的至少一个:独立地对可更换单元的状态进行初始化的初始化操作;执行公共加密算法的处理操作;以及成像设备的主体和可更换单元之间的相互认证操作。The OS of the CPU can drive the replaceable unit, the OS of the CPU can be a kind of software, and the software performs at least one of the following: an initialization operation independently initializing the state of the replaceable unit; executing a public encryption algorithm processing operations; and mutual authentication operations between the main body of the imaging device and the replaceable unit.

所述CPU可执行所述加密数据通信,使得当包括数据和第一消息认证码(MAC)信息的通信消息从成像设备的主体被发送时,所述CPU通过将密钥和加密算法应用于发送的通信消息的数据部分来产生第二MAC,并且当产生的第二MAC与发送的通信消息的第一MAC信息进行比较并与所述第一MAC信息一致时,产生的第二MAC被认为是有效的通信消息并被处理。The CPU may perform the encrypted data communication such that when a communication message including data and first message authentication code (MAC) information is transmitted from the main body of the image forming apparatus, the CPU transmits the encrypted data by applying a key and an encryption algorithm The data portion of the communication message to generate the second MAC, and when the generated second MAC is compared with the first MAC information of the sent communication message and is consistent with the first MAC information, the generated second MAC is considered to be Valid communication messages are processed.

当成像设备开启时,或者当可更换单元被安装在成像设备上时,所述CPU可执行初始化,并且在初始化被完成之前可对来自成像设备的主体的命令不进行响应。The CPU may perform initialization when the image forming apparatus is turned on, or when the replaceable unit is mounted on the image forming apparatus, and may not respond to a command from a main body of the image forming apparatus until the initialization is completed.

所述可更换单元还可包括:接口单元,将成像设备连接到所述CPU;篡改检测器,对物理窃用尝试进行响应;以及密码机单元,通过应用多种加密算法中的设置的加密算法,允许所述CPU执行与成像设备的主体的加密数据通信。The replaceable unit may further include: an interface unit connecting the imaging device to the CPU; a tamper detector responding to a physical tampering attempt; and a cipher unit by applying a set encryption algorithm among a plurality of encryption algorithms, The CPU is allowed to perform encrypted data communication with the main body of the imaging device.

应用于加密数据通信的加密算法是可改变的。The encryption algorithm used to encrypt data communications is variable.

所述CPU可从成像设备的主体接收当执行成像作业时用于成像作业的耗材的程度的值,并且所述CPU将所述值与存储在存储单元中的关于耗材使用的信息相加,然后刷新存储在存储单元中的关于耗材使用的信息。The CPU may receive, from a main body of the image forming apparatus, a value of a degree of consumables used for an image forming job when the image forming job is performed, and the CPU may add the value to information on use of consumables stored in a storage unit, and then Refreshes the information on the usage of consumables stored in the storage unit.

可通过提供一种成像设备来实现本发明总体构思的实施例,所述成像设备包括:主控制器;以及至少一个单元,包括存储单元和CPU,所述存储单元存储信息,所述CPU使用自己的操作系统(OS)管理存储单元并执行与主控制器的加密数据通信,所述CPU的OS与主控制器的OS分开。Embodiments of the present general inventive concept can be realized by providing an image forming apparatus including: a main controller; and at least one unit including a storage unit storing information and a CPU using its own The operating system (OS) of the CPU manages the storage unit and performs encrypted data communication with the main controller, and the OS of the CPU is separate from the OS of the main controller.

所述CPU可独立于主控制器使用自己的操作系统执行初始化。The CPU can perform initialization using its own operating system independently of the main controller.

所述CPU可执行所述加密数据通信,使得当包括数据和第一消息认证码(MAC)信息的通信消息从成像设备的主体被发送时,所述CPU通过将密钥和加密算法应用于发送的通信消息的数据部分来产生第二MAC,并且当产生的第二MAC与发送的通信消息的第一MAC信息进行比较并与所述第一MAC信息一致时,产生的第二MAC被认为是有效的通信消息并被处理。The CPU may perform the encrypted data communication such that when a communication message including data and first message authentication code (MAC) information is transmitted from the main body of the image forming apparatus, the CPU transmits the encrypted data by applying a key and an encryption algorithm The data portion of the communication message to generate the second MAC, and when the generated second MAC is compared with the first MAC information of the sent communication message and is consistent with the first MAC information, the generated second MAC is considered to be Valid communication messages are processed.

在所述加密数据通信之前,主控制器可通过接收为所述至少一个单元中的每个单元设置的独有数字签名信息来尝试执行认证。Before the encrypted data communication, the main controller may attempt to perform authentication by receiving unique digital signature information set for each of the at least one unit.

主控制器可通过应用RSA非对称密钥算法以及ARIA、三重数据加密标准(TDES)、SEED和高级加密标准(AES)对称密钥算法之一来执行加密数据通信,并且所述单元的CPU通过应用ARIA、TDES、SEED和AES对称密钥算法之一来执行加密数据通信。The main controller can perform encrypted data communication by applying the RSA asymmetric key algorithm and one of the ARIA, Triple Data Encryption Standard (TDES), SEED, and Advanced Encryption Standard (AES) symmetric key algorithms, and the CPU of the unit passes Apply one of ARIA, TDES, SEED and AES symmetric key algorithms to perform encrypted data communication.

所述单元还可包括:密码机单元,通过应用多种加密算法中的设置的加密算法,允许所述CPU执行与主控制器的认证或加密数据通信;以及篡改检测器,对物理窃用尝试进行响应。The unit may further include: a cipher unit for allowing the CPU to perform authentication or encrypted data communication with the main controller by applying a set encryption algorithm among a plurality of encryption algorithms; and a tamper detector for detecting physical tampering attempts response.

主控制器可通过一个串行I/O通道连接到所述至少一个单元,并且使用分配给每个单元各自的地址来访问所述至少一个单元。The master controller is connectable to the at least one unit through a serial I/O channel, and accesses the at least one unit using a respective address assigned to each unit.

当执行作业时,主控制器可测量用于所述作业的耗材的程度的值,将测量的值发送到所述至少一个单元的每个CPU,将所述值与预先存储在存储单元中的关于耗材使用的信息相加,然后刷新存储在存储单元中的关于耗材使用的信息。When performing a job, the main controller may measure the value of the degree of the consumables used for the job, transmit the measured value to each CPU of the at least one unit, compare the value with the value previously stored in the storage unit The information on the use of the consumables is added, and then the information on the use of the consumables stored in the storage unit is refreshed.

所述CPU的OS可驱动所述单元,并且所述CPU的OS可以是一种软件,所述软件执行下列中的至少一个:初始化操作;执行公共加密算法的处理操作;以及主控制器和所述单元之间的相互认证操作。The OS of the CPU may drive the unit, and the OS of the CPU may be a software that performs at least one of: an initialization operation; a processing operation for executing a public encryption algorithm; and a main controller and all Mutual authentication operation between the above units.

所述单元可以是下列中的一个:与成像设备的成像作业直接相关的可更换单元;可安装在可更换单元上的CRUM单元;以及可安装在CRUM单元上的芯片。The unit may be one of: a replaceable unit directly related to an image forming operation of the image forming apparatus; a CRUM unit mountable on the replaceable unit; and a chip mountable on the CRUM unit.

可通过提供一种计算机可读介质来实现本发明总体构思的实施例,所述计算机可读介质包含计算机可读代码作为执行一种方法的程序,所述方法包括:使用中央处理单元(CPU)的操作系统(OS)来执行与成像设备的主体的加密数据通信,所述CPU的OS与成像设备的OS分开。Embodiments of the present general inventive concept can be realized by providing a computer-readable medium containing computer-readable code as a program for executing a method comprising: using a central processing unit (CPU) An operating system (OS) of the CPU is separate from the OS of the imaging device to perform encrypted data communication with the main body of the imaging device.

可通过提供一种可安装在用于成像设备的可更换单元上的芯片来实现本发明总体构思的实施例,所述芯片包括:中央处理单元(CPU),具有自己的操作系统(OS),所述OS与成像设备的OS分开,从而所述CPU使用自己的OS来执行与成像设备的主体的加密数据通信;以及存储单元,存储关于所述芯片、用户可更换单元监控(CRUM)单元、具有所述CRUM单元的可更换单元以及所述CPU的操作系统中的至少一个的信息,其中,所述CPU的OS设置在位于所述芯片内的存储单元中,或者设置在位于所述芯片外部的存储器中。Embodiments of the present general inventive concept can be realized by providing a chip mountable on a replaceable unit for an image forming apparatus, the chip comprising: a central processing unit (CPU) with its own operating system (OS), The OS is separated from the OS of the imaging device so that the CPU performs encrypted data communication with the main body of the imaging device using its own OS; and a storage unit that stores information about the chip, a customer replaceable unit monitor (CRUM) unit, Information about at least one of the replaceable unit of the CRUM unit and the operating system of the CPU, wherein the OS of the CPU is set in a storage unit located inside the chip, or is set outside the chip in the memory.

根据本发明总体构思的示例性实施例,具有自己的操作系统(OS)的CPU被安装在所述单元上,从而所述单元可独立地管理存储单元。所述单元可以是芯片、CRUM单元或可更换单元。所述OS被驱动,从而可执行初始化、加密算法驱动以及与成像设备的主体的认证。According to an exemplary embodiment of the present general inventive concept, a CPU having its own operating system (OS) is installed on the unit so that the unit can independently manage the storage unit. The unit may be a chip, a CRUM unit or a replaceable unit. The OS is driven so that initialization, encryption algorithm driving, and authentication with the main body of the imaging device can be performed.

即使当主密钥没有被存储在具有所述单元的成像设备中,所述成像设备也可执行与所述单元的认证或加密数据通信。因此,可防止主密钥被泄露。可使用基于随机值和电子签名信息产生的MAC来执行认证或加密数据通信。通过应用对称密钥算法和非对称密钥算法来执行认证,从而该加密提供高等级的数据安全性。Even when the master key is not stored in the imaging device having the unit, the imaging device can perform authentication or encrypted data communication with the unit. Therefore, the master key can be prevented from being leaked. Authentication or encrypted data communication can be performed using a MAC generated based on a random value and electronic signature information. This encryption provides a high level of data security by applying a symmetric key algorithm and an asymmetric key algorithm to perform authentication.

多种加密算法可被选择性地应用于认证和加密数据通信。即使当前使用的加密算法受到物理窃用而被攻击,也可通过应用其它加密算法的密钥来替换当前使用的密钥(而不需要用新的单元来更换所述单元)来防止攻击。Various encryption algorithms can be selectively applied to authenticate and encrypt data communication. Even if the currently used encryption algorithm is attacked by physical theft, the attack can be prevented by replacing the currently used key with a key of another encryption algorithm (without needing to replace the unit with a new one).

如果使用多个单元,则对每个单元设置电子签名信息。为每个单元分配各自的地址,因此所述单元可通过串行接口被连接到成像设备。可有效地实现多个单元之间的认证和加密数据通信。If multiple units are used, electronic signature information is set for each unit. Each unit is assigned an individual address so that the units can be connected to the imaging device via a serial interface. Authentication and encrypted data communication between multiple units can be effectively realized.

如果完成了成像作业,则成像设备测量用于成像作业的耗材的程度,并且将测量的值发送到多个单元中的每个。因此,可防止由于错误而记录关于使用的耗材的程度的不正确信息。If the image forming job is completed, the image forming apparatus measures the extent of consumables used for the image forming job, and transmits the measured value to each of the plurality of units. Therefore, it is possible to prevent incorrect information about the degree of used consumables from being recorded by mistake.

其结果是,防止了存储在内置于成像设备中的存储单元中的数据被拷贝或复制,并且增强了数据的安全性。也可防止用户使用未经认证的单元。As a result, the data stored in the storage unit built in the imaging device is prevented from being copied or duplicated, and the security of the data is enhanced. It also prevents users from using uncertified units.

附图说明 Description of drawings

通过下面结合附图对实施例进行描述,本发明总体构思的上述和/或其它方面和特点将会变得清楚,并更易于理解,其中:The above and/or other aspects and features of the general inventive concept of the present invention will become clear and easier to understand by describing the embodiments below in conjunction with the accompanying drawings, wherein:

图1是示出根据本发明总体构思的示例性实施例的包括可更换单元的成像设备的构造的示意性框图;1 is a schematic block diagram illustrating a configuration of an image forming apparatus including replaceable units according to an exemplary embodiment of the present general inventive concept;

图2是示出根据本发明总体构思的示例性实施例的可更换单元的详细框图;2 is a detailed block diagram illustrating a replaceable unit according to an exemplary embodiment of the present general inventive concept;

图3是示出根据本发明总体构思的示例性实施例的成像设备的示意性框图;3 is a schematic block diagram illustrating an image forming apparatus according to an exemplary embodiment of the present general inventive concept;

图4是示出根据本发明总体构思的示例性实施例的内置到成像设备和可更换单元的软件的配置的示意性框图;4 is a schematic block diagram illustrating configurations of software built into an image forming apparatus and a replaceable unit according to an exemplary embodiment of the present general inventive concept;

图5是示出根据本发明总体构思的示例性实施例的操作可更换单元和成像设备的方法的流程图;5 is a flowchart illustrating a method of operating a replaceable unit and an image forming apparatus according to an exemplary embodiment of the present general inventive concept;

图6是示出根据本发明总体构思的示例性实施例的由可更换单元改变加密算法的过程的流程图;以及6 is a flowchart illustrating a process of changing an encryption algorithm by a replaceable unit according to an exemplary embodiment of the present general inventive concept; and

图7是示出根据本发明总体构思的示例性实施例的执行成像设备和可更换单元之间的认证和加密数据通信的方法的流程图。FIG. 7 is a flowchart illustrating a method of performing authentication and encrypted data communication between an image forming apparatus and a replaceable unit according to an exemplary embodiment of the present general inventive concept.

具体实施方式 Detailed ways

现在,将详细参照本发明总体构思的实施例,其示例在附图中被示出,其中,相同的标号始终表示相同的元件。以下,通过参照附图描述实施例,以解释本发明总体构思。Reference will now be made in detail to embodiments of the present general inventive concept, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to like elements throughout. The embodiments are described below in order to explain the present general inventive concept by referring to the figures.

图1是示出根据本发明总体构思的示例性实施例的包括可更换单元的成像设备的构造的示意性框图。如图1所示,成像设备100包括主控制器110,单元200可内置在成像设备100中。成像设备100可以是复印机、打印机、多功能外设、传真机或扫描仪。FIG. 1 is a schematic block diagram illustrating a configuration of an image forming apparatus including replaceable units according to an exemplary embodiment of the present general inventive concept. As shown in FIG. 1 , the image forming apparatus 100 includes a main controller 110 , and the unit 200 may be built in the image forming apparatus 100 . The image forming apparatus 100 may be a copier, a printer, a multifunction peripheral, a facsimile, or a scanner.

成像设备100可包括CPU(OS)110a以控制成像设备100的操作。单元200是指被设计为单独地安装和使用的组件。更具体地讲,单元200可以是包括可更换部件215的可更换单元,可更换部件215形成在成像设备中并直接介入成像操作。例如,可更换单元200的可更换部件215可以是调色剂盒或墨盒、充电单元、转印单元、定影单元、有机感光导体(OPC)、输送单元或输送辊等。The image forming apparatus 100 may include a CPU (OS) 110 a to control operations of the image forming apparatus 100 . Unit 200 refers to components designed to be installed and used individually. More specifically, the unit 200 may be a replaceable unit including a replaceable part 215 formed in the imaging apparatus and directly intervening in the imaging operation. For example, the replaceable part 215 of the replaceable unit 200 may be a toner or ink cartridge, a charging unit, a transfer unit, a fixing unit, an organic photosensitive conductor (OPC), a conveyance unit or a conveyance roller, or the like.

此外,单元200可以是成像设备100所需的任何其他组件,并且在使用期间可被更换。即,单元200可以是通过包含在可更换单元中能够监控并管理组件的状态的用户可更换单元监控(CRUM)单元,或者可以是内置在CRUM单元中的芯片。单元200可以以不同的形式被实现,但是为了便于说明,下面描述被实现为可更换单元的单元200。In addition, the unit 200 may be any other component required for the image forming apparatus 100 and may be replaced during use. That is, the unit 200 may be a customer replaceable unit monitoring (CRUM) unit capable of monitoring and managing states of components by being included in a replaceable unit, or may be a chip built into the CRUM unit. Unit 200 may be implemented in different forms, but for ease of illustration, unit 200 implemented as a replaceable unit is described below.

主控制器110可具有与外部装置(未示出)通信以接收数据的接口,并且可使用接收的数据执行成像操作。主控制器110还可连接到例如传真单元或扫描单元,以接收或发送与成像设备相应的数据。The main controller 110 may have an interface to communicate with an external device (not shown) to receive data, and may perform an imaging operation using the received data. The main controller 110 may also be connected to, for example, a facsimile unit or a scanning unit to receive or transmit data corresponding to an image forming device.

成像设备100可包括成像单元150,成像单元150使用单元200来执行成像操作。当单元200被安装到成像设备100的主体中时,单元200可以是成像单元150的一部分。主控制器110可控制存储单元210和成像单元150,以输送介质从而在介质上形成图像,并且排放该介质。The imaging apparatus 100 may include an imaging unit 150 that performs an imaging operation using the unit 200 . The unit 200 may be a part of the imaging unit 150 when the unit 200 is installed into the body of the imaging apparatus 100 . The main controller 110 may control the storage unit 210 and the image forming unit 150 to convey a medium to form an image on the medium, and to discharge the medium.

如图1所示,单元200包括存储单元210和中央处理单元(CPU)220。As shown in FIG. 1 , the unit 200 includes a storage unit 210 and a central processing unit (CPU) 220 .

存储单元210存储关于单元200的各种类型的信息,更具体地说,存储独有信息(例如,关于单元200的制造商的信息、关于制造时间的信息、序列号或型号)、各种程序、关于电子签名的信息、关于使用状态的状态信息(例如,到目前为止已经打印了多少张纸、剩余的可打印能力或者还剩下多少调色剂)。The storage unit 210 stores various types of information on the unit 200, more specifically, unique information (for example, information on a manufacturer of the unit 200, information on a manufacturing time, a serial number or a model number), various programs , information on electronic signatures, status information on usage status (for example, how many sheets have been printed so far, remaining printability, or how much toner is left).

例如,存储单元210可存储如下面的表1中的信息。For example, the storage unit 210 may store information as in Table 1 below.

如上面的表1所示,存储单元210可存储关于耗材的寿命的信息和设置菜单以及关于单元200的概略信息。存储单元210还可存储用于处理存储在存储单元210中的数据的操作系统(OS)的信息,从而主控制器110可控制成像单元150和单元200执行成像操作。As shown in Table 1 above, the storage unit 210 may store information on the life of consumables and setting menus and summary information on the unit 200 . The storage unit 210 may also store information of an operating system (OS) for processing data stored in the storage unit 210 so that the main controller 110 may control the imaging unit 150 and the unit 200 to perform imaging operations.

CPU 220使用该CPU 220的操作系统(OS)管理存储单元210。用于对单元200进行操作的OS是指操作通用应用程序的软件。因此,CPU 220可通过使用OS来执行初始化。The CPU 220 manages the storage unit 210 using an operating system (OS) of the CPU 220. The OS for operating the unit 200 refers to software that operates general-purpose applications. Therefore, the CPU 220 can perform initialization by using the OS.

更具体地说,CPU 220在特定事件的时间执行初始化,例如,当包括单元200的成像设备100开启时,或者当单元200或包括单元200的组件(例如,可更换单元)结合到成像设备100或者与成像设备100分离时。初始化包括在单元200中使用的各种应用程序的初始驱动、在初始化之后与成像设备进行数据通信所需的秘密计算信息、通信通道的设置、存储器值的初始化、更换时间的确认、单元200中的寄存器值的设置以及内部和外部时钟信号的设置。More specifically, the CPU 220 performs initialization at the time of a specific event, for example, when the imaging device 100 including the unit 200 is turned on, or when the unit 200 or a component including the unit 200 (for example, a replaceable unit) is incorporated into the imaging device 100 Or when the imaging device 100 is separated. Initialization includes initial drive of various applications used in the unit 200, secret calculation information required for data communication with the imaging device after initialization, setting of communication channels, initialization of memory values, confirmation of replacement time, The setting of register values and the setting of internal and external clock signals.

寄存器值的设置是指为了使单元200在与用户先前设置的状态相同的状态下操作而设置单元200中的功能寄存器值。此外,内部和外部时钟信号的设置是指将从成像设备100的主控制器110提供的外部时钟信号的频率调整为在单元200的CPU 220中使用的内部时钟的频率。The setting of the register value refers to setting the function register value in the unit 200 in order to make the unit 200 operate in the same state as the state previously set by the user. In addition, the setting of the internal and external clock signals refers to adjusting the frequency of the external clock signal supplied from the main controller 110 of the imaging device 100 to the frequency of the internal clock used in the CPU 220 of the unit 200.

更换时间的确认是指检查使用中的调色剂或墨的剩余量,预测调色剂或墨将会耗尽的时间,并将该时间通知主控制器110。如果在初始化期间确定调色剂已经耗尽,则在完成初始化之后,单元200可被实现为自动通知主控制器110操作不能执行。在其它情况下,由于单元200包括CPU的OS,因此可根据单元200的类型或特性执行各种形式的初始化。The confirmation of the replacement time refers to checking the remaining amount of toner or ink in use, predicting the time when the toner or ink will be exhausted, and notifying the main controller 110 of the time. If it is determined during initialization that the toner has been exhausted, the unit 200 may be implemented to automatically notify the main controller 110 that the operation cannot be performed after the initialization is completed. In other cases, since the unit 200 includes the OS of the CPU, various forms of initialization may be performed according to the type or characteristics of the unit 200 .

由单元200自己执行该初始化,从而该初始化独立于由成像设备100的主控制器110执行的初始化而被执行。This initialization is performed by the unit 200 itself, so that it is performed independently of the initialization performed by the main controller 110 of the imaging device 100 .

如上所述,CPU 220内置于单元200中,单元200具有自己的OS,因此如果成像设备100开启,则主控制器110可在请求与单元200通信之前检查存储在存储单元210中的耗材的剩余量和再补充的量。因此,通知主控制器耗材需要更换要花费较短的时间。例如,如果调色剂不足,则用户可开启成像设备100,并将成像设备100直接转换到调色剂节省模式。即使当仅一种特定的调色剂不足时,用户也可执行同样的操作。As described above, the CPU 220 is built into the unit 200, and the unit 200 has its own OS, so if the image forming apparatus 100 is turned on, the main controller 110 can check the remaining amount of consumables stored in the storage unit 210 before requesting communication with the unit 200. volume and refill volume. Therefore, it takes a shorter time to notify the main controller that the consumable needs to be replaced. For example, if the toner is insufficient, the user may turn on the image forming apparatus 100 and directly shift the image forming apparatus 100 to the toner saving mode. Even when only one specific toner is insufficient, the user can perform the same operation.

在初始化完成之前,CPU 220不响应主控制器110的命令。主控制器110周期性地将命令发送到CPU 220,直到主控制器110从CPU 220接收到响应。Before the initialization is completed, the CPU 220 does not respond to the commands of the main controller 110. The main controller 110 periodically sends commands to the CPU 220 until the main controller 110 receives a response from the CPU 220.

如果主控制器110接收到响应,即,应答,则在主控制器110和CPU 220之间开始认证。If the main controller 110 receives a response, that is, an acknowledgment, authentication between the main controller 110 and the CPU 220 starts.

在此情况下,单元200中的OS通过单元200和成像设备100之间的交互作用进行认证。然而,为了使传统的成像设备执行认证,成像设备的主控制器单向访问所述单元,识别用于认证的独有信息,并将独有信息与存储的信息进行比较。In this case, the OS in the unit 200 performs authentication through the interaction between the unit 200 and the imaging device 100 . However, in order for a conventional image forming apparatus to perform authentication, a main controller of the image forming apparatus unidirectionally accesses the unit, recognizes unique information for authentication, and compares the unique information with stored information.

然而,当前成像设备100中的主控制器110独立于单元200的初始化执行自己的初始化。由于系统大小的不同,单元200的初始化首先完成。如果单元200的初始化完成,则单元200可使用OS来驱动加密算法。更具体地说,单元200可响应于主控制器110的命令来驱动加密算法,从而可执行主控制器110和单元200之间的交互认证而非主控制器110的单向认证。因此,认证的安全性增加。However, the main controller 110 in the current image forming apparatus 100 performs its own initialization independently of the initialization of the unit 200 . Due to system size differences, initialization of unit 200 is done first. If the initialization of the unit 200 is completed, the unit 200 may drive an encryption algorithm using the OS. More specifically, the unit 200 may drive an encryption algorithm in response to a command of the main controller 110 so that mutual authentication between the main controller 110 and the unit 200 rather than one-way authentication of the main controller 110 may be performed. Therefore, the security of authentication is increased.

这样的认证不限于上述示例,可以以不同的方式执行该认证。例如,主控制器110可从CPU 220接收响应,并将命令发送到请求认证的CPU 220。在此情况下,随机值R1可与命令一起被发送到CPU 220。CPU 220接收对认证的请求和随机值R1,使用随机值R1产生会话密钥,使用产生的会话密钥产生第一消息认证码(MAC),并将产生的第一MAC、预先存储的电子签名信息以及随机值R2发送到主控制器110。Such authentication is not limited to the above-mentioned examples, and it may be performed in various ways. For example, main controller 110 may receive a response from CPU 220 and send a command to CPU 220 requesting authentication. In this case, the random value R1 may be sent to the CPU 220 together with the command. The CPU 220 receives the request for authentication and the random value R1, uses the random value R1 to generate a session key, uses the generated session key to generate a first message authentication code (MAC), and uses the generated first MAC, the pre-stored electronic signature The information is sent to the main controller 110 along with the random value R2.

如果主控制器110通过验证第一MAC、接收的电子签名信息识别认证,则主控制器110使用接收的随机值R2和预先产生的随机值R1产生会话密钥,并使用该会话密钥产生第二MAC。最后,主控制器110通过识别产生的第二MAC与接收的第一MAC是否相同来验证第二MAC。结果,主控制器110可确定是否成功地执行了认证。如上所述,由于在发送用于认证的信息或命令时使用了随机值,因此可防止第三方的恶意窃用(hacking)。If the main controller 110 is authenticated by verifying the first MAC and the received electronic signature information, the main controller 110 generates a session key using the received random value R2 and the pre-generated random value R1, and uses the session key to generate the second session key. Two MACs. Finally, the main controller 110 verifies the second MAC by identifying whether the generated second MAC is the same as the received first MAC. As a result, the main controller 110 can determine whether authentication is successfully performed. As described above, since random values are used when sending information or commands for authentication, malicious hacking by a third party can be prevented.

如果成功地执行了认证,则在主控制器110和单元200的CPU之间执行加密数据通信。如上所述,由于单元200具有自己的OS,因此可以执行加密算法。因此,可通过将加密算法应用到从成像设备100接收的数据来确定数据有效性。作为确定的结果,如果数据有效,则单元200接收数据并执行用于处理数据的操作。如果数据无效,则单元200一接收到数据就丢弃该数据。在此情况下,单元200可通知主控制器110在数据通信中存在问题。If authentication is successfully performed, encrypted data communication is performed between the main controller 110 and the CPU of the unit 200 . As described above, since the unit 200 has its own OS, it can execute encryption algorithms. Accordingly, data validity may be determined by applying an encryption algorithm to data received from the image forming apparatus 100 . As a result of the determination, if the data is valid, the unit 200 receives the data and performs operations for processing the data. If the data is invalid, the unit 200 discards the data as soon as it is received. In this case, unit 200 may notify main controller 110 that there is a problem in data communication.

加密算法可使用公共标准加密算法。当加密密钥被公开或者当需要增强安全性时,可以修改该加密算法。The encryption algorithm may use a public standard encryption algorithm. The encryption algorithm can be modified when the encryption key is made public or when enhanced security is required.

在上面的本发明总体构思的示例性实施例中,由于单元200具有自己的OS、自己的初始化,因此可有效地执行单元200和成像设备100之间的认证和加密数据通信。In the above exemplary embodiments of the present general inventive concept, since the unit 200 has its own OS, its own initialization, authentication and encrypted data communication between the unit 200 and the image forming apparatus 100 may be efficiently performed.

图2是示出图1示出的成像设备100的可更换单元200的详细框图。图2的可更换单元200除了先前讨论的存储单元210和CPU 220之外还包括:密码机单元230、篡改(tamper)检测器240以及接口单元250。此外,可更换单元200还可包括输出时钟信号的时钟单元(未示出)或者产生用于认证的随机值的随机值产生器(未示出)。这里讨论的可更换单元200取决于应用可包括更少的组件或更多的组件。如果可更换单元200被实现为半导体芯片或芯片封装,则芯片或芯片封装自己可包括CPU 220,或者可包括存储单元210和CPU 220。如果芯片仅包括CPU 220,则由CPU 220运行的OS可由外部存储器提供。FIG. 2 is a detailed block diagram illustrating the replaceable unit 200 of the image forming apparatus 100 illustrated in FIG. 1 . The replaceable unit 200 of FIG. 2 also includes, in addition to the previously discussed storage unit 210 and CPU 220: a cipher unit 230, a tamper detector 240, and an interface unit 250. In addition, the replaceable unit 200 may further include a clock unit (not shown) that outputs a clock signal or a random value generator (not shown) that generates a random value for authentication. The replaceable unit 200 discussed herein may include fewer components or more components depending on the application. If the replaceable unit 200 is implemented as a semiconductor chip or a chip package, the chip or chip package itself may include the CPU 220, or may include the storage unit 210 and the CPU 220. If the chip includes only the CPU 220, the OS run by the CPU 220 may be provided by an external memory.

密码机单元230支持加密算法,并使CPU 220执行与主控制器110的认证或加密数据通信。具体地讲,密码机单元230可支持四种加密算法(即,ARIA、三重数据加密标准(TDES)、SEED和高级加密标准(AES)对称密钥算法)中的一种。The cipher unit 230 supports encryption algorithms, and causes the CPU 220 to perform authentication or encrypted data communication with the main controller 110. Specifically, the cipher unit 230 may support one of four encryption algorithms (ie, ARIA, Triple Data Encryption Standard (TDES), SEED, and Advanced Encryption Standard (AES) symmetric key algorithms).

为了执行认证或加密数据通信,主控制器110也支持所述四种加密算法。因此,主控制器110可确定可更换单元200应用了哪种加密算法,可使用确定的加密算法执行认证,并且随后可执行与CPU 220的加密数据通信。结果,可更换单元200可容易地安装在成像设备100中,从而即使应用了特定加密算法的密钥被产生时也可执行加密数据通信。In order to perform authentication or encrypted data communication, the main controller 110 also supports the four encryption algorithms. Accordingly, the main controller 110 can determine which encryption algorithm is applied to the replaceable unit 200, can perform authentication using the determined encryption algorithm, and then can perform encrypted data communication with the CPU 220. As a result, the replaceable unit 200 can be easily installed in the image forming apparatus 100 so that encrypted data communication can be performed even when a key to which a specific encryption algorithm is applied is generated.

篡改检测器240防止各种物理的窃用攻击,即,篡改。更具体地说,如果通过监测操作条件(例如,电压、温度、压力、光或频率)来检测攻击,则篡改检测器240可删除与攻击有关的数据,或者可物理地防止攻击。在此情况下,篡改检测器240可包括额外的电源来供电以维持其操作。攻击可以是开盖(decap)攻击,所述开盖攻击例如可以是对CRUM单元200的潜在损害攻击。The tamper detector 240 protects against various physical hacking attacks, ie, tampering. More specifically, if an attack is detected by monitoring operating conditions such as voltage, temperature, pressure, light, or frequency, the tamper detector 240 may delete data related to the attack, or may physically prevent the attack. In this case, the tamper detector 240 may include an additional power source to provide power to maintain its operation. The attack may be a decap attack, which may be a potentially damaging attack on the CRUM unit 200, for example.

如上所述,可更换单元200包括密码机单元230和篡改检测器240,可使用硬件和软件之一或者两者来系统地保护数据。As described above, the replaceable unit 200 includes the cryptographic unit 230 and the tamper detector 240, and data can be systematically protected using either or both of hardware and software.

参照图2,存储单元210可包括OS存储器211、非易失性存储器212和易失性存储器213中的至少一个。Referring to FIG. 2 , the storage unit 210 may include at least one of an OS memory 211 , a nonvolatile memory 212 and a volatile memory 213 .

OS存储器211存储用于操作可更换单元200的OS。非易失性存储器212以非易失性的形式存储数据,易失性存储器213用作操作所需的临时存储空间。当存储单元210包括如图2所示的OS存储器211、非易失性存储器212和易失性存储器213时,这些存储器中的一些可内置于CPU220中作为内部存储器。与一般的存储器不同,可根据用于安全的设计(例如,地址/数据线置乱或比特加密)来实现OS存储器211、非易失性存储器212和易失性存储器213。The OS memory 211 stores an OS for operating the replaceable unit 200 . The nonvolatile memory 212 stores data in a nonvolatile form, and the volatile memory 213 is used as a temporary storage space required for operations. When the storage unit 210 includes an OS memory 211, a nonvolatile memory 212, and a volatile memory 213 as shown in FIG. 2, some of these memories may be built into the CPU 220 as an internal memory. Unlike general memories, the OS memory 211, the nonvolatile memory 212, and the volatile memory 213 may be implemented according to a design for security such as address/data line scrambling or bit encryption.

非易失性存储器212可存储各种信息,例如,数字签名信息、关于各种加密算法的信息、关于可更换单元200的使用的状态的信息(例如,关于剩余的调色剂水平的信息、需要更换调色剂的时间、或者剩余的待打印的纸的数量)、独有信息(例如,关于可更换单元200的制造商的信息、关于制造的日期和时间的信息、序列号或型号)或者维修服务信息。The nonvolatile memory 212 can store various information such as digital signature information, information on various encryption algorithms, information on the state of use of the replaceable unit 200 (for example, information on the remaining toner level, time when the toner needs to be replaced, or the amount of remaining paper to be printed), unique information (for example, information on the manufacturer of the replaceable unit 200, information on the date and time of manufacture, serial number or model number) or maintenance service information.

接口单元250连接CPU 220和主控制器110。接口单元250可被实现为串行接口或无线接口。例如,由于串行接口比并行接口使用更少的信号,因此串行接口具有降低成本的优点,并且串行接口适于产生大量噪声的操作条件(例如,打印机)。The interface unit 250 connects the CPU 220 and the main controller 110. The interface unit 250 may be implemented as a serial interface or a wireless interface. For example, a serial interface has an advantage of cost reduction because it uses fewer signals than a parallel interface, and is suitable for operating conditions that generate a lot of noise (for example, a printer).

图2示出的组件经总线彼此连接,但这仅是示例性的。因此,应该理解,根据本发明总体构思的多个方面的组件可以在没有总线的情况下直接连接。Components shown in FIG. 2 are connected to each other via a bus, but this is only exemplary. Accordingly, it should be understood that components according to aspects of the present general inventive concept may be directly connected without a bus.

图3是示出根据本发明总体构思的示例性实施例的成像设备100的框图。图3的成像设备100包括主控制器110、存储单元120、成像单元150和多个单元200-1、200-2、...、200-n,主控制器110包括具有OS的CPU 110a。图3的多个单元200-1、200-2、...、200-n可以是CRUM单元、半导体芯片、半导体芯片封装或可更换单元。仅为了举例的目的,下面将多个单元200-1、200-2、...、200-n描述为可更换单元。FIG. 3 is a block diagram illustrating an image forming apparatus 100 according to an exemplary embodiment of the present general inventive concept. The imaging apparatus 100 of FIG. 3 includes a main controller 110, a storage unit 120, an imaging unit 150, and a plurality of units 200-1, 200-2, . . . , 200-n, and the main controller 110 includes a CPU 110a having an OS. The plurality of units 200-1, 200-2, . . . , 200-n of FIG. 3 may be CRUM units, semiconductor chips, semiconductor chip packages, or replaceable units. For purposes of example only, the plurality of units 200-1, 200-2, . . . , 200-n are described below as replaceable units.

如果单个系统需要各种耗材,则也需要多个单元。例如,如果成像设备100是彩色打印机,则为了表现期望的颜色在彩色打印机中安装四个色盒,即,青色(C)盒、品红色(M)盒、黄色(Y)盒和黑色(K)盒。此外,彩色打印机可包括其他耗材。因此,如果需要大量的单元,则每个单元需要其各自的输入/输出(I/O)通道,这种布置是低效率的。因此,如图3所示,单个串行I/O通道可用于将多个单元200-1、200-2、...、200-n中的每个连接到主控制器110。主控制器110可使用分配给到多个单元200-1、200-2、...、200-n中的每个的不同地址来访问多个单元200-1、200-2、...、200-n中的每个。Multiple units are also required if a single system requires various consumables. For example, if the image forming apparatus 100 is a color printer, four color cartridges, namely, a cyan (C) cartridge, a magenta (M) cartridge, a yellow (Y) cartridge, and a black (K) cartridge, are installed in the color printer in order to express desired colors. )box. Additionally, color printers may include other consumables. Therefore, if a large number of cells are required, each cell requires its own input/output (I/O) channel, an arrangement that is inefficient. Thus, as shown in FIG. 3 , a single serial I/O channel can be used to connect each of the plurality of units 200 - 1 , 200 - 2 , . . . , 200 -n to the main controller 110 . The main controller 110 may access the plurality of units 200-1, 200-2, ... using a different address assigned to each of the plurality of units 200-1, 200-2, ..., 200-n , each of 200-n.

当主控制器110开启时,或者当多个单元200-1、200-2、...、200-n安装在成像设备100中时,如果多个单元200-1、200-2、...、200-n中的每个被完全初始化,则使用多个单元200-1、200-2、...、200-n中的每个的独有数字签名信息来执行认证。When the main controller 110 is turned on, or when the plurality of units 200-1, 200-2, . . . , 200-n are fully initialized, authentication is performed using unique digital signature information for each of the plurality of units 200-1, 200-2, . . . , 200-n.

如果认证成功,则主控制器110与多个单元200-1、200-2、...、200-n中的多个CPU(未示出)执行加密数据通信,并且将关于使用历史的信息存储在多个单元200-1、200-2、...、200-n中的多个存储单元(未示出)中。主控制器110和多个CPU可用作主装置和从装置。If the authentication is successful, the main controller 110 performs encrypted data communication with a plurality of CPUs (not shown) in the plurality of units 200-1, 200-2, . Stored in a plurality of storage units (not shown) among the plurality of units 200-1, 200-2, . . . , 200-n. The main controller 110 and a plurality of CPUs can function as a master and a slave.

这里,通过将用户期望传输的数据与MAC一起传输来执行加密数据通信,所述MAC通过使用预设的加密算法和密钥对数据加密被产生。由于数据在每次被传输时发生变化,所以MAC也会改变。因此,即使当第三方介入数据通信操作并寻找MAC时,第三方使用MAC不能窃用随后的数据通信操作。Here, encrypted data communication is performed by transmitting data that a user desires to transmit together with a MAC generated by encrypting data using a preset encryption algorithm and key. Since the data changes each time it is transmitted, the MAC also changes. Therefore, even when a third party intervenes in the data communication operation and finds the MAC, the third party cannot steal the subsequent data communication operation using the MAC.

如果完成了加密数据通信,则切断主控制器110和CPU之间连接的通道。If encrypted data communication is completed, the channel connecting the main controller 110 and the CPU is cut off.

存储单元120存储各种信息,所述信息包括对多个单元200-1、200-2、...、200-n中的每个进行认证所需的多个加密算法和密钥值。The storage unit 120 stores various information including a plurality of encryption algorithms and key values required to authenticate each of the plurality of units 200-1, 200-2, . . . , 200-n.

主控制器110使用存储在存储单元120中的信息来执行认证和加密数据通信。具体地讲,主控制器110通过应用例如RSA非对称密钥算法以及ARIA、TDES、SEED、AES对称密钥算法之一,来执行认证和加密数据通信。因此,非对称认证处理和对称认证处理都被执行,从而相对于传统技术,可提高加密级别。The main controller 110 performs authentication and encrypted data communication using information stored in the storage unit 120 . Specifically, the main controller 110 performs authentication and encrypted data communication by applying, for example, one of the RSA asymmetric key algorithm and ARIA, TDES, SEED, AES symmetric key algorithms. Therefore, both asymmetric authentication processing and symmetric authentication processing are performed, so that the level of encryption can be increased compared to conventional techniques.

尽管图3显示了存储单元120作为单个单元,但是存储单元120可包括存储各种加密算法数据的存储单元、主控制器110的其它操作所需的存储单元、存储关于多个单元200-1、200-2、...、200-n的信息的存储单元、或存储关于多个单元200-1、200-2、...、200-n的使用的信息(例如,将被打印的页数或剩余调色剂水平)的存储单元。Although FIG. 3 shows the storage unit 120 as a single unit, the storage unit 120 may include a storage unit storing various encryption algorithm data, a storage unit required for other operations of the main controller 110, storing information about a plurality of units 200-1, 200-2, ..., 200-n information storage unit, or store information about the use of a plurality of units 200-1, 200-2, ..., 200-n (for example, pages to be printed number or remaining toner level).

安装在图3的成像设备100中的多个单元200-1、200-2、...、200-n可具有图1或图2所示的结构。因此,在将访问命令发送到多个单元200-1、200-2、...、200-n的多个CPU并且接收到应答信号后,主控制器110可访问多个单元200-1、200-2、...、200-n。因此,根据本发明总体构思的多个单元与能够访问CRUM数据的传统方案不同,所述传统方案使用简单的数据写入和读取操作。The plurality of units 200-1, 200-2, . . . , 200-n installed in the image forming apparatus 100 of FIG. 3 may have the structure shown in FIG. 1 or FIG. 2 . Therefore, after sending an access command to a plurality of CPUs of a plurality of units 200-1, 200-2, ..., 200-n and receiving a response signal, the main controller 110 can access a plurality of units 200-1, 200-2, . . . , 200-n. Therefore, the multiple units according to the present general inventive concept are different from conventional schemes capable of accessing CRUM data using simple data writing and reading operations.

如果成像设备100开始成像作业,则主控制器110可测量用于该作业的耗材的程度,并且可将测量的所使用的耗材的程度发送到多个单元200-1、200-2、...、200-n中的每个。更具体地讲,成像设备100可将测量的所使用的耗材的程度与先前存储的关于耗材使用的信息相加,并且可刷新关于耗材使用的信息。当在现有技术中进行发送结果值的操作时,如果由于错误而发送不正确的数据,则关于使用的耗材的程度的不正确的信息可被记录在多个单元200-1、200-2、...、200-n中的每个上。例如,如果在使用当前安装的显影剂盒打印1000页之后完成了新的10页的打印作业,则总值是1010页。但是,如果发生一些错误并且如果发送0页的值,则0页的打印作业可被记录在多个单元200-1、200-2、...、200-n。其结果是,用户可能不能准确地知道需要更换耗材的时间。If the image forming apparatus 100 starts an image forming job, the main controller 110 may measure the level of consumables used for the job, and may transmit the measured levels of used consumables to the plurality of units 200-1, 200-2, . . . ., each of 200-n. More specifically, the image forming apparatus 100 may add the measured degree of used consumables to previously stored information on the use of consumables, and may refresh the information on the use of consumables. When the operation of transmitting the result value is performed in the prior art, if incorrect data is transmitted due to an error, incorrect information on the degree of used consumables may be recorded in the plurality of units 200-1, 200-2 , . . . , on each of 200-n. For example, if a new print job of 10 pages is completed after printing 1000 pages using the currently installed developer cartridge, the total value is 1010 pages. However, if some error occurs and if a value of 0 pages is sent, a print job of 0 pages may be recorded in the plurality of units 200-1, 200-2, . . . , 200-n. As a result, the user may not know exactly when the consumables need to be replaced.

为了解决该问题,在本发明总体构思的实施例中,主控制器110可测量用于作业的耗材的程度,并且可仅将测量的所使用的耗材的程度发送到多个单元200-1、200-2、...、200-n中的每个。在这种情况下,主控制器110可发送10页的值,从而多个单元200-1、200-2、...、200-n可通过使用它们自己的CPU将新接收的值“10”与值“1000”(即,先前存储的值)相加。因此,存储在存储器中的关于耗材使用的信息可被准确更新为“1010”。To solve this problem, in an embodiment of the present general inventive concept, the main controller 110 may measure the level of consumables used for the job, and may transmit only the measured levels of used consumables to the plurality of units 200-1, Each of 200-2, . . . , 200-n. In this case, the main controller 110 can send the value of 10 pages, so that the plurality of units 200-1, 200-2, . . . , 200-n can transfer the newly received value "10 " is added to the value "1000" (ie, the previously stored value). Therefore, the information on the use of the consumables stored in the memory can be accurately updated to "1010".

另外,主控制器110可通过将测量的量与存储在存储单元120中的关于耗材使用的信息相加,与多个单元200-1、200-2、...、200-n分开而自己管理关于所使用的耗材的程度的信息。In addition, the main controller 110 may separate the plurality of units 200-1, 200-2, . Manage information about the extent of consumables used.

然而,在本发明总体构思的实施例中,在每次执行作业时,主控制器110可在将关于所使用的耗材的程度的信息发送到多个单元200-1、200-2、...、200-n的同时,自动更新存储在存储单元120中的关于耗材使用的信息。However, in an embodiment of the present general inventive concept, the main controller 110 may transmit information on the degree of used consumables to the plurality of units 200-1, 200-2, . . . ., 200-n, the information about the use of consumables stored in the storage unit 120 is automatically updated.

例如,当使用安装在成像设备100中的多个单元200-1、200-2、...、200-n打印100页时,如果在执行单个作业的同时还打印10页,则主控制器110可将值“10”发送到多个单元200-1、200-2、...、200-n,并且可将值“10”与先前存储在存储单元120中的值“100”相加,从而存储指示打印了“110”页的历史信息。因此,如果发送特定事件(例如,如果成像设备100被重置,或者调色剂或墨被完全耗尽),或者预设的时间段到来,则主控制器110和多个单元200-1、200-2、...、200-n可通过使用它们各自的CPU来比较它们各自的历史信息,从而可检查数据是否被正常记录在多个单元200-1、200-2、...、200-n中的每个中。For example, when printing 100 pages using the plurality of units 200-1, 200-2, ..., 200-n installed in the image forming apparatus 100, if 10 pages are also printed while executing a single job, the main 110 may send the value "10" to multiple units 200-1, 200-2, ..., 200-n, and may add the value "10" to the value "100" previously stored in memory unit 120 , thereby storing history information indicating that "110" pages were printed. Therefore, if a specific event is sent (for example, if the image forming apparatus 100 is reset, or the toner or ink is completely exhausted), or a preset time period comes, the main controller 110 and the plurality of units 200-1, 200-2, . . . , 200-n can compare their respective history information by using their respective CPUs, so that it can be checked whether data is normally recorded in the plurality of units 200-1, 200-2, . Each of the 200-n.

换句话说,可通过将存储在存储单元120中的关于耗材使用的信息与存储在多个单元200-1、200-2、...、200-n中的关于耗材使用的信息进行比较,来确定存储的关于耗材使用的信息的准确性或不准确性。更详细地讲,如果发生事件或预设的时间段到来,则主控制器110可将用于请求关于耗材使用的信息的命令发送到多个单元200-1、200-2、...、200-n。响应于该请求命令,多个单元200-1、200-2、...、200-n的CPU可将存储在其中的关于耗材使用的信息发送到主控制器110。In other words, by comparing the information on the use of consumables stored in the storage unit 120 with the information on the use of consumables stored in the plurality of units 200-1, 200-2, . . . , 200-n, to determine the accuracy or inaccuracy of stored information about supply usage. In more detail, if an event occurs or a preset time period comes, the main controller 110 may transmit a command for requesting information on the use of consumables to the plurality of units 200-1, 200-2, . . . , 200-n. In response to the request command, the CPUs of the plurality of units 200-1, 200-2, .

如果存储在存储单元120中的关于耗材使用的信息与存储在多个单元200-1、200-2、...、200-n中的关于耗材使用的信息不同,则主控制器110可输出错误信息,或者可协调被确定为正确的信息并可更新关于耗材使用的信息。If the information on the use of consumables stored in the storage unit 120 is different from the information on the use of consumables stored in the plurality of units 200-1, 200-2, . . . , 200-n, the main controller 110 may output erroneous information, or information determined to be correct may be reconciled and information on consumable usage may be updated.

此外,如果存储在存储单元120中的关于耗材使用的信息与存储在多个单元200-1、200-2、...、200-n之一中的关于耗材使用的信息不同,则因为在数据被发送到存储单元120时可能出现错误,所以主控制器110可发送用于改变存储在存储单元120中的关于耗材使用的信息的命令。Furthermore, if the information on the use of consumables stored in the storage unit 120 is different from the information on the use of consumables stored in one of the plurality of units 200-1, 200-2, . . . An error may occur when data is transmitted to the storage unit 120 , so the main controller 110 may transmit a command for changing information on the use of consumables stored in the storage unit 120 .

成像设备100可包括成像单元150,成像单元150用于使用单元200-1、200-2、...、200-n来执行成像操作。当单元200-1、200-2、...、200-n被安装在成像设备100的主体中时,单元200-1、200-2、...、200-n可以是成像单元150的一部分。主控制器110可控制存储单元120和210以及成像单元150,以输送介质从而在介质上形成图像,并排放该介质。The imaging apparatus 100 may include an imaging unit 150 for performing an imaging operation using the units 200-1, 200-2, . . . , 200-n. When the units 200-1, 200-2, . . . , 200-n are installed in the main body of the imaging device 100, the units 200-1, 200-2, . part. The main controller 110 may control the storage units 120 and 210 and the image forming unit 150 to convey a medium to form an image on the medium, and to discharge the medium.

图4是示出根据本发明总体构思的示例性实施例的单元200和使用该单元200的主机(即,成像设备的软件的配置)的分层图。4 is a layered diagram illustrating a unit 200 and a host (ie, a configuration of software of an image forming apparatus) using the unit 200 according to an exemplary embodiment of the present general inventive concept.

参照图1和图4,成像设备100的软件(a)除了包括通用应用程序、用于管理每个单元的数据的应用、执行自身管理的装置驱动程序以及执行命令的程序之外,还可包括执行与单元200的认证和加密的安全性机制区域以及执行软件加密的软件加密操作区域。Referring to FIGS. 1 and 4 , the software (a) of the image forming apparatus 100 may include, in addition to a general-purpose application program, an application for managing data of each unit, a device driver for performing its own management, and a program for executing commands. A security mechanism area that performs authentication and encryption with the unit 200 and a software encryption operation area that performs software encryption.

单元200的软件(b)可包括:半导体IC芯片区域,具有保护数据的各种块;App区域,与主机软件进行接口连接;以及OS区域,操作上述区域。The software (b) of the unit 200 may include: a semiconductor IC chip area with various blocks protecting data; an App area for interfacing with host software; and an OS area for operating the aforementioned areas.

图4的装置软件区域包括OS的基本部件,诸如保护数据所需的操作块和文件管理。简要地,所述块包括为安全性系统而控制硬件的程序、使用硬件控制程序的应用程序以及用于防止利用其它程序进行篡改的程序。由于用于实现CRUM的功能的应用程序被安装在如上面所解释的程序上,所以不能通过通信通道来检查存储在数据上的信息。可按照其它结构来实现所述程序以包括所述块。然而,为了有效地保护数据,需要细心地对程序进行编程,从而保护OS。The device software area of FIG. 4 includes basic components of the OS, such as operation blocks and file management required to protect data. Briefly, the blocks include a program to control hardware for a security system, an application program to control the program using the hardware, and a program to prevent tampering with other programs. Since the application program for realizing the functions of CRUM is installed on the program as explained above, information stored on the data cannot be checked through the communication channel. The programs may be implemented in other structures to include the blocks. However, in order to effectively protect data, programs need to be programmed carefully, thereby protecting the OS.

图4的软件结构中的OS区域包括存储器恢复区域410。设置存储器恢复区域410,以保证是否根据更新单元200的条件信息的处理成功完成了更新。The OS area in the software structure of FIG. 4 includes a memory recovery area 410 . The memory recovery area 410 is set to ensure whether or not the process according to the condition information of the update unit 200 has successfully completed the update.

再次参照图1和图2,当数据被写入到存储单元210时,单元200的CPU220将先前记录的值备份在存储器恢复区域410中,并设置开始标志。Referring again to FIGS. 1 and 2, when data is written to the storage unit 210, the CPU 220 of the unit 200 backs up the previously recorded values in the memory recovery area 410, and sets a start flag.

例如,当使用单元200的成像作业被完成时,主控制器110访问单元200的CPU 220,以重新记录条件信息(诸如当执行打印作业时消耗的页数或供应物的量)。如果电源被切断,或者在完成记录之前由于外部噪声导致打印作业被异常终止,则传统的CRUM不能确定新的条件信息是否被正常记录。如果这样的异常条件被重复,则难以信任该信息,并且即使使用CRUM也难以管理所述单元。For example, when an image forming job using the unit 200 is completed, the main controller 110 accesses the CPU 220 of the unit 200 to re-record condition information such as the number of sheets consumed or the amount of supplies when the print job is performed. If the power is cut off, or the print job is abnormally terminated due to external noise before the recording is completed, the conventional CRUM cannot determine whether the new condition information is normally recorded. If such abnormal conditions are repeated, it is difficult to trust the information, and it is difficult to manage the unit even with CRUM.

为了防止该问题,根据本发明总体构思的示例性实施例的OS在该OS中设置存储器恢复区域410。在这种情况下,CPU在记录数据之前将先前记录的数据备份在存储器恢复区域410中,并且将开始标志设置为0。如果处理数据写入操作,则开始标志根据该数据写入操作被不断更新。In order to prevent this problem, the OS according to an exemplary embodiment of the present general inventive concept sets a memory recovery area 410 in the OS. In this case, the CPU backs up the previously recorded data in the memory restoration area 410 and sets the start flag to 0 before recording the data. If a data write operation is processed, the start flag is continuously updated according to the data write operation.

在这种情况下,如果数据写入操作被异常终止,则CPU在电源被接通之后或在系统稳定之后检查开始标志。CPU由此根据开始标志值的变化条件确定数据是否被正常写入。如果开始标志值与初始设置值之间的差不显著,则CPU确定数据写入失败,并且将数据退回到先前记录的值。另一方面,如果开始标志值与最终值近似一致,则CPU确定当前记录的数据是正确的。因此,即使当电源被断开,或者当系统异常操作,写入到单元200中的数据也是可以被信任的。In this case, if the data writing operation is abnormally terminated, the CPU checks the start flag after the power is turned on or after the system is stabilized. The CPU thus determines whether the data is normally written or not according to the change condition of the start flag value. If the difference between the start flag value and the initially set value is not significant, the CPU determines that data writing has failed, and rolls back the data to the previously recorded value. On the other hand, if the start flag value approximately coincides with the final value, the CPU determines that the currently recorded data is correct. Therefore, even when the power is turned off, or when the system operates abnormally, the data written into the unit 200 can be trusted.

图5是示出根据本发明总体构思的示例性实施例的操作可更换单元和成像设备的方法的流程图。参照图1和图5,在操作S510,单元200的CPU确定是否发生了特定事件。特定事件可包括:成像设备100被开启的情况;或者单元200或包括该单元200的组件被安装在成像设备100中的情况。FIG. 5 is a flowchart illustrating a method of operating a replaceable unit and an image forming apparatus according to an exemplary embodiment of the present general inventive concept. Referring to FIGS. 1 and 5, the CPU of the unit 200 determines whether a specific event occurs in operation S510. The specific event may include: a case where the imaging apparatus 100 is turned on; or a case where the unit 200 or a component including the unit 200 is installed in the imaging apparatus 100 .

如果确定发生了特定事件,则在操作S520,单元200执行自身的初始化。所述初始化包括:计算在初始化之后与成像设备的数据通信所需的秘密信息、通信通道的设置、存储器值的初始化、检查调色剂或墨的剩余量、更换时间的确认或各种其它处理。If it is determined that a specific event has occurred, the unit 200 performs initialization of itself in operation S520. The initialization includes calculation of secret information required for data communication with the image forming apparatus after initialization, setting of a communication channel, initialization of memory values, checking remaining amount of toner or ink, confirmation of replacement time, or various other processes .

在操作S530,成像设备100的主控制器110发送用于尝试在主控制器110和CPU 220之间进行认证的命令。如果在操作S540主控制器110没有从CPU220接收到响应,则主控制器110重复发送该命令,直到接收到响应。The main controller 110 of the image forming apparatus 100 transmits a command for attempting authentication between the main controller 110 and the CPU 220 in operation S530. If the main controller 110 does not receive a response from the CPU 220 at operation S540, the main controller 110 repeatedly transmits the command until a response is received.

当接收到响应时,在操作S550,如上面所解释的,主控制器110对与CPU 220之间的通信进行认证。When the response is received, at operation S550, the main controller 110 authenticates communication with the CPU 220 as explained above.

如果在操作S560成功执行了认证,则在操作S570,使用加密算法来执行与主控制器110的加密数据通信。If authentication is successfully performed at operation S560, encrypted data communication with the main controller 110 is performed using an encryption algorithm at operation S570.

图6是被提供以解释根据本发明总体构思的示例性实施例的由单元200改变加密算法的过程的示意图。参照图6,单元200可支持例如ARIA、三重数据加密标准(TDES)、SEED和高级加密标准(AES)对称密钥算法。可在密钥管理系统(KMS)600中的密钥写入系统产生了密钥产生数据时确定使用何种算法。FIG. 6 is a diagram provided to explain a process of changing an encryption algorithm by the unit 200 according to an exemplary embodiment of the present general inventive concept. Referring to FIG. 6, the unit 200 may support, for example, ARIA, Triple Data Encryption Standard (TDES), SEED, and Advanced Encryption Standard (AES) symmetric key algorithms. Which algorithm to use may be determined when the key generation data is generated by a key writing system in the key management system (KMS) 600 .

如果执行了加密算法的破解(cracking),则可通过从应用了上述四种加密算法的KMS获取新的密钥(而不是制造新的单元200),来改变加密算法。If cracking of the encryption algorithm is performed, the encryption algorithm can be changed by acquiring a new key from the KMS to which the above four encryption algorithms are applied (instead of manufacturing a new unit 200).

如上所述,成像设备100除了支持RSA非对称密钥算法之外,还可支持ARIA、TDES、SEED和AES对称密钥算法。因此,即使应用于单元200的加密算法被改变,成像设备100也进行响应而改变加密算法,并且执行认证和加密数据通信。As described above, the image forming apparatus 100 may support ARIA, TDES, SEED, and AES symmetric key algorithms in addition to the RSA asymmetric key algorithm. Therefore, even if the encryption algorithm applied to the unit 200 is changed, the imaging device 100 changes the encryption algorithm in response, and performs authentication and encrypted data communication.

因此,相比于需要更换芯片的传统技术,可通过改变密钥值来方便地改变加密算法。Therefore, compared with the traditional technology that needs to replace the chip, the encryption algorithm can be changed conveniently by changing the key value.

图7是被提供以解释根据本发明总体构思的示例性实施例的执行认证和加密数据通信的方法的流程图。参照图1和图7,在操作S710,成像设备100将用于请求认证的命令与随机值R1一起发送。FIG. 7 is a flowchart provided to explain a method of performing authentication and encryption of data communication according to an exemplary embodiment of the present general inventive concept. Referring to FIGS. 1 and 7, the image forming apparatus 100 transmits a command for requesting authentication together with a random value R1 in operation S710.

如果接收到用于认证的请求,则在操作S715,单元200使用接收的随机值R1和单元200产生的随机值R2来产生会话密钥,并且在操作S720,单元200使用产生的会话密钥来产生消息认证码(MAC)。If a request for authentication is received, in operation S715, the unit 200 generates a session key using the received random value R1 and the random value R2 generated by the unit 200, and in operation S720, the unit 200 uses the generated session key to Generate a Message Authentication Code (MAC).

单元200产生的第一MAC是预先存储的电子签名信息,并且在操作S725,第一MAC和随机值R2被一起发送到成像设备100。The first MAC generated by the unit 200 is pre-stored electronic signature information, and the first MAC is transmitted to the image forming apparatus 100 together with the random value R2 in operation S725.

在操作S730,成像设备100通过将接收的电子签名信息与预先存储的电子签名信息进行比较,来验证接收的由单元200产生的第一MAC的电子签名。为了验证接收的电子签名,如果多个单元被安装在成像设备100中,则成像设备100可存储每个单元的电子签名信息。In operation S730, the image forming apparatus 100 verifies the received electronic signature of the first MAC generated by the unit 200 by comparing the received electronic signature information with pre-stored electronic signature information. In order to verify the received electronic signature, if a plurality of units are installed in the image forming apparatus 100, the image forming apparatus 100 may store electronic signature information of each unit.

如果接收的电子签名被验证,则在操作S735,成像设备100可将预先产生的随机值R1与接收的随机值R2进行组合来产生会话密钥,并且在操作S740,成像设备100使用产生的会话密钥产生第二MAC。If the received electronic signature is verified, in operation S735, the image forming apparatus 100 may combine the pre-generated random value R1 with the received random value R2 to generate a session key, and in operation S740, the image forming apparatus 100 uses the generated session key The key generates a second MAC.

然后在操作S745,成像设备100将产生的成像设备100的第二MAC与可更换单元200的接收的第一MAC进行比较,以确定这两个独立的MAC是否一致。根据接收的可更换单元200的第一MAC的验证来完成认证。如果成功执行了认证,则可执行加密数据通信。Then in operation S745, the image forming apparatus 100 compares the generated second MAC of the image forming apparatus 100 with the received first MAC of the replaceable unit 200 to determine whether the two independent MACs are consistent. Authentication is done based on the verification of the received first MAC of the replaceable unit 200 . If authentication is successfully performed, encrypted data communication can be performed.

为了执行加密数据通信,假设成像设备100使用与单元200的密钥和加密算法相同的密钥和加密算法。密钥可以是如上所述的会话密钥。In order to perform encrypted data communication, it is assumed that the image forming apparatus 100 uses the same key and encryption algorithm as those of the unit 200 . The key may be a session key as described above.

如果接收的可更换单元200的第一MAC被完全验证,则在操作S750,成像设备100在产生通信消息时通过将密钥和加密算法应用于数据来产生第三MAC。If the received first MAC of the replaceable unit 200 is completely verified, the image forming apparatus 100 generates a third MAC by applying a key and an encryption algorithm to data when generating a communication message in operation S750.

在操作S755,成像设备100将包括第三MAC的通信消息发送到单元200。In operation S755, the image forming apparatus 100 transmits a communication message including the third MAC to the unit 200.

在操作S760,单元200从接收的通信消息提取数据部分,并且通过将上述密钥和加密算法应用于所述数据来产生第四MAC。In operation S760, the unit 200 extracts a data part from the received communication message, and generates a fourth MAC by applying the aforementioned key and encryption algorithm to the data.

在操作S765,单元200从接收的通信消息提取第三MAC部分,并且通过将提取的第三MAC与单元200计算的第四MAC进行比较来执行认证。In operation S765, the unit 200 extracts a third MAC part from the received communication message, and performs authentication by comparing the extracted third MAC with the fourth MAC calculated by the unit 200.

如果提取的第三MAC与单元200计算的第四MAC一致,则在操作S770,通信消息被认为是有效的通信消息,并因此执行与所述消息相应的操作。另一方面,如果第三MAC和第四MAC彼此不一致,则通信消息被认为是无效的通信消息,并且被丢弃。If the extracted third MAC is consistent with the fourth MAC calculated by the unit 200, the communication message is regarded as a valid communication message at operation S770, and thus an operation corresponding to the message is performed. On the other hand, if the third MAC and the fourth MAC are inconsistent with each other, the communication message is considered to be an invalid communication message and is discarded.

执行认证和加密数据通信的方法也可应用于参照附图所解释的示例性实施例。单元200可按照不同的形式(诸如半导体芯片或芯片封装、普通单元或可更换单元)被实现。The method of performing authentication and encryption of data communication is also applicable to the exemplary embodiments explained with reference to the accompanying drawings. The unit 200 may be implemented in different forms, such as a semiconductor chip or chip package, a regular unit or a replaceable unit.

本发明总体构思也可被实施为计算机可读介质上的计算机可读代码。计算机可读介质可包括计算机可读记录介质和计算机可读传输介质。计算机可读记录介质是可存储数据作为程序而其后可被计算机系统读取的任何数据存储装置。计算机可读记录介质的示例包括只读存储器(ROM)、随机存取存储器(RAM)、CD-ROM、磁带、软盘、光学数据存储装置。计算机可读记录介质也可以被分布在网络连接的计算机系统上,从而计算机可读代码以分布式方式被存储和执行。计算机可读传输介质可传输载波或信号(例如,通过互联网的有线或无线数据传输)。另外,本发明总体构思所属领域的程序设计员可容易地解释实现本发明总体构思的功能程序、代码和代码段。The present general inventive concept can also be embodied as computer readable codes on a computer readable medium. The computer readable medium may include a computer readable recording medium and a computer readable transmission medium. The computer readable recording medium is any data storage device that can store data as a program, which can be thereafter read by a computer system. Examples of the computer readable recording medium include read only memory (ROM), random access memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage devices. The computer readable recording medium can also be distributed over network coupled computer systems so that the computer readable code is stored and executed in a distributed fashion. The computer-readable transmission medium can transmit carrier waves or signals (eg, wired or wireless data transmission through the Internet). In addition, a programmer in the field to which the present general inventive concept pertains can easily explain functional programs, codes, and code segments for realizing the present general inventive concept.

尽管已经显示和描述了本发明总体构思的一些实施例,但是本领域技术人员应该理解,在不脱离权利要求及其等同物限定其范围的本发明总体构思的原理和精神的情况下,可以对这些实施例进行改变。While a few embodiments of the present general inventive concept have been shown and described, it should be understood by those skilled in the art that, without departing from the principles and spirit of the present general inventive concept, the scope of which is defined by the claims and their equivalents, modifications may be made. These examples vary.

Claims (33)

1. an imaging device, comprising:
The main body of imaging device;
At least one replaceable units, is installed to the main body of imaging device, for carrying out imaging operation,
Wherein, the main body of imaging device comprises for controlling the master controller of the operation of imaging device,
Wherein, described at least one replaceable units comprises:
Storage unit, storage is about the information of replaceable units, and storage operation system;
CPU, be connected to storage unit, wherein, when replaceable units is installed to imaging device, CPU is used the operating system in the storage unit that is stored in replaceable units to carry out initialization, CPU is configured to access and is stored in the information in storage unit, and the encrypted data communications of the master controller of execution and imaging device
Wherein, another operating system of the operating system of CPU and master controller operates independently,
Wherein, CPU carries out described encrypted data communications, make when the communication information that comprises data and the first message authentication code information is sent out from the main body of imaging device, described CPU assigns to produce the second message authentication code by the data portion of the communication information that key and cryptographic algorithm is applied to send, and when the second message authentication code producing compares with the first message authentication code information of the communication information of transmission and with described the first message authentication code information when consistent, it is also processed that the second message authentication code of generation is considered to effective communication information.
2. imaging device according to claim 1, wherein, the cell stores of replaceable units is the operating system of being carried out by CPU, and is included in operating system for carrying out initialized program, and the operating system of CPU is different from the operating system of master controller.
3. imaging device according to claim 1, wherein, described at least one replaceable units is carried out the encrypted data communications with master controller by being applied in the cryptographic algorithm of selecting in multiple encryption algorithms.
4. imaging device according to claim 1, wherein, master controller is the exclusive digital signature information of each setting in described at least one replaceable units by use, carries out the encrypted data communications with described at least one replaceable units.
5. imaging device according to claim 1, wherein, master controller is carried out encrypted data communications by application one of ARIA, TDES, SEED and AES symmetric key algorithm and RSA asymmetric key algorithm, and the CPU of described at least one replaceable units carries out encrypted data communications by application one of ARIA, TDES, SEED and AES symmetric key algorithm.
6. imaging device according to claim 1, wherein, replaceable units also comprises:
Cipher machine unit, the encrypted data communications of the master controller of permission CPU execution and imaging device;
Distort detecting device, physics steal is attempted responding.
7. imaging device according to claim 1, wherein, storage unit has the software configuration that comprises storer recovery region, and when the data write operation for storage unit is performed, CPU recovers the value backup of precedence record in region and opening flag is set at storer.
8. imaging device according to claim 7, wherein, when particular event occurs, CPU checks the value of the change of opening flag, then determines whether the value changing returns to the value of precedence record.
9. imaging device according to claim 1, wherein, master controller is connected to described at least one replaceable units by serial i/0 passage, and uses and distribute to each replaceable units address separately and visit described at least one replaceable units.
10. imaging device according to claim 1, wherein, when carrying out imaging operation, master controller is measured the value for the degree of the consumptive material use of described imaging operation, the value of measurement is sent to each CPU of described at least one replaceable units, described CPU, by described value and the pre-stored information of using about consumptive material addition in each storage unit, then upgrades the information of using about consumptive material.
11. imaging devices according to claim 10, wherein, the main body of imaging device also comprises for storing the storage unit of the information of using about consumptive material,
Wherein, the value of the degree that master controller uses the consumptive material of measuring and the pre-stored information of using about consumptive material addition in storage unit, and manage discretely with described at least one replaceable units the information of using about consumptive material.
12. imaging devices according to claim 11, wherein, master controller compares the information of using about consumptive material being stored in storage unit with the information of using about consumptive material being stored in replaceable units, determine the accuracy of the information of using about consumptive material of storage.
13. imaging devices according to claim 1, wherein, the cell stores of replaceable units is for carrying out the program with the encrypted data communications of master controller, describedly for carrying out the program of encrypted data communications, after the initialization of CPU, is performed.
14. imaging devices according to claim 1, wherein, replaceable units is the chip being built in user's replaceable units monitoring unit.
15. 1 kinds of user's replaceable units monitoring units for replaceable units, described replaceable units is arranged in imaging device removedly, and described imaging device has master controller, and described user's replaceable units monitoring unit comprises:
Storage unit, storage is about the information of replaceable units, and storage operation system;
CPU, be connected to storage unit, wherein, when replaceable units is installed to imaging device, CPU is used the operating system in the storage unit that is stored in replaceable units to carry out initialization, CPU is configured to access and is stored in the information in storage unit, and the encrypted data communications of the master controller of execution and imaging device
Wherein, another operating system of the operating system of CPU and master controller operates independently,
Wherein, CPU carries out described encrypted data communications, make when the communication information that comprises data and the first message authentication code information is sent out from the master controller of imaging device, described CPU assigns to produce the second message authentication code by the data portion of the communication information that key and cryptographic algorithm is applied to send, and when the second message authentication code producing compares with the first message authentication code information of the communication information of transmission and with described the first message authentication code information when consistent, it is also processed that the second message authentication code of generation is considered to effective communication information.
16. user's replaceable units monitoring units according to claim 15, wherein, cell stores is the operating system of being carried out by CPU, and is included in operating system for carrying out initialized program, and the operating system of CPU is different from the operating system of being carried out by master controller.
17. user's replaceable units monitoring units according to claim 15, wherein, after the authentication of the master controller with imaging device completes, CPU carries out described encrypted data communications.
18. user's replaceable units monitoring units according to claim 15, wherein, when imaging opening of device, and when thering is the replaceable units of described user's replaceable units monitoring unit and be installed on imaging device, CPU carries out initialization, and before initialization is done to coming the order of autonomous controller not respond.
19. user's replaceable units monitoring units according to claim 15, wherein, storage unit comprises at least one in following: operating system storer; Nonvolatile memory, with non-volatile form storage data; Volatile memory, with operating required interim storage space.
20. user's replaceable units monitoring units according to claim 15, also comprise:
Interface unit, is connected to CPU by master controller;
Distort detecting device, physics steal is attempted responding; And
Cipher machine unit, permission CPU carries out the encrypted data communications with master controller.
21. user's replaceable units monitoring units according to claim 15, wherein, described user's replaceable units monitoring unit is carried out the encrypted data communications with master controller by being applied in the cryptographic algorithm of selecting in multiple encryption algorithms.
22. user's replaceable units monitoring units according to claim 15, wherein, storage unit has the software configuration that comprises storer recovery region, and when the data write operation for storage unit is performed, CPU recovers the value backup of precedence record in region and opening flag is set at storer.
23. user's replaceable units monitoring units according to claim 22, wherein, when particular event occurs, CPU checks the value of the change of opening flag, then determines whether the value changing returns to the value of precedence record.
24. user's replaceable units monitoring units according to claim 15, wherein, CPU receives the value of the degree of the consumptive material use that is used for imaging operation when carrying out imaging operation from master controller, and CPU is added described value and the information of using about consumptive material being stored in storage unit, then refreshes the information of using about consumptive material.
25. 1 kinds of replaceable unitses that are arranged on removedly in imaging device, described imaging device has master controller, and described replaceable units comprises:
Storage unit, storage is about the information of replaceable units, and storage operation system;
CPU, be connected to storage unit, wherein, when replaceable units is installed to imaging device, CPU is used the operating system in the storage unit that is stored in replaceable units to carry out initialization, CPU is configured to access and is stored in the information in storage unit, and the encrypted data communications of the master controller of execution and imaging device
Wherein, another operating system of the operating system of CPU and master controller operates independently,
Wherein, CPU carries out described encrypted data communications, make when the communication information that comprises data and the first message authentication code information is sent out from the master controller of imaging device, described CPU assigns to produce the second message authentication code by the data portion of the communication information that key and cryptographic algorithm is applied to send, and when the second message authentication code producing compares with the first message authentication code information of the communication information of transmission and with described the first message authentication code information when consistent, it is also processed that the second message authentication code of generation is considered to effective communication information.
26. replaceable unitses according to claim 25, wherein, cell stores is the operating system of being carried out by CPU, and is included in operating system for carrying out initialized program, and the operating system of CPU is different from the operating system of being carried out by master controller.
27. replaceable unitses according to claim 25, wherein, after the authentication of the master controller with imaging device completes, CPU carries out described encrypted data communications.
28. replaceable unitses according to claim 25, wherein, when imaging opening of device, and when described replaceable units is installed on imaging device, CPU carries out initialization, and before initialization is done, the order of the master controller from imaging device is not responded.
29. replaceable unitses according to claim 25, wherein, storage unit comprises at least one in following: operating system storer; Nonvolatile memory, with non-volatile form storage data; Volatile memory, with operating required interim storage space.
30. replaceable unitses according to claim 25, also comprise:
Interface unit, is connected to CPU by described master controller;
Distort detecting device, physics steal is attempted responding; And
Cipher machine unit, permission CPU carries out the encrypted data communications with described master controller.
31. replaceable unitses according to claim 25, wherein, described replaceable units is carried out the encrypted data communications with master controller by being applied in the cryptographic algorithm of selecting in multiple encryption algorithms.
32. replaceable unitses according to claim 25, wherein, storage unit has the software configuration that comprises storer recovery region, and when the data write operation for storage unit is performed, CPU recovers the value backup of precedence record in region and opening flag is set at storer, and when particular event occurs, CPU also checks the value of the change of opening flag, then determine whether the value changing returns to the value of precedence record.
33. replaceable unitses according to claim 25, wherein, CPU receives the value of the usage degree of the consumptive material using when using described replaceable units to carry out imaging operation from the master controller of imaging device, and CPU is added described value and the information of using about consumptive material being stored in storage unit, then refreshes the information of using about consumptive material.
CN201010557633.4A 2008-03-03 2009-03-02 Unit using operating system and image forming apparatus using the same Active CN102073236B (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
KR20080019844 2008-03-03
KR10-2008-0019844 2008-03-03
KR10-2008-0063068 2008-06-30
KR1020080063068A KR100997879B1 (en) 2008-03-03 2008-06-30 CRUM unit, replaceable unit, and image forming apparatus using same, and method for communicating encrypted data

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN2009100077892A Division CN101526796B (en) 2008-03-03 2009-03-02 Unit using operating system and image forming apparatus using the same

Publications (2)

Publication Number Publication Date
CN102073236A CN102073236A (en) 2011-05-25
CN102073236B true CN102073236B (en) 2014-10-01

Family

ID=41094676

Family Applications (12)

Application Number Title Priority Date Filing Date
CN201110127716.4A Active CN102200714B (en) 2008-03-03 2009-02-27 Unit using operation system and image forming apparatus using the same
CN201010557657.XA Active CN102073237B (en) 2008-03-03 2009-02-27 Unit using operating system and image forming apparatus using the same
CN2009101180621A Active CN101527767B (en) 2008-03-03 2009-02-27 Unit using the operating system and imaging device using the same
CN201310217758.6A Active CN103345134B (en) 2008-03-03 2009-03-02 Use the unit of OS and use the imaging device of described unit
CN201010557633.4A Active CN102073236B (en) 2008-03-03 2009-03-02 Unit using operating system and image forming apparatus using the same
CN2009100077892A Active CN101526796B (en) 2008-03-03 2009-03-02 Unit using operating system and image forming apparatus using the same
CN201110136289.6A Active CN102213924B (en) 2008-03-03 2009-03-02 Unit using OS and image forming apparatus using the same
CN200910007791XA Active CN101526772B (en) 2008-03-03 2009-03-02 Unit using operating system and image forming apparatus using the same
CN201210122996.4A Active CN102682238B (en) 2008-03-03 2009-03-02 Method and device for executing enciphered data communication
CN201010542831.3A Active CN102063031B (en) 2008-03-03 2009-03-02 Use the unit of operating system and use the imaging device of this unit
CN2009100077888A Active CN101526771B (en) 2008-03-03 2009-03-02 Unit using OS and image forming apparatus using the same
CN201010550444.4A Active CN102063034B (en) 2008-03-03 2009-03-02 Unit using OS and image forming apparatus using the same

Family Applications Before (4)

Application Number Title Priority Date Filing Date
CN201110127716.4A Active CN102200714B (en) 2008-03-03 2009-02-27 Unit using operation system and image forming apparatus using the same
CN201010557657.XA Active CN102073237B (en) 2008-03-03 2009-02-27 Unit using operating system and image forming apparatus using the same
CN2009101180621A Active CN101527767B (en) 2008-03-03 2009-02-27 Unit using the operating system and imaging device using the same
CN201310217758.6A Active CN103345134B (en) 2008-03-03 2009-03-02 Use the unit of OS and use the imaging device of described unit

Family Applications After (7)

Application Number Title Priority Date Filing Date
CN2009100077892A Active CN101526796B (en) 2008-03-03 2009-03-02 Unit using operating system and image forming apparatus using the same
CN201110136289.6A Active CN102213924B (en) 2008-03-03 2009-03-02 Unit using OS and image forming apparatus using the same
CN200910007791XA Active CN101526772B (en) 2008-03-03 2009-03-02 Unit using operating system and image forming apparatus using the same
CN201210122996.4A Active CN102682238B (en) 2008-03-03 2009-03-02 Method and device for executing enciphered data communication
CN201010542831.3A Active CN102063031B (en) 2008-03-03 2009-03-02 Use the unit of operating system and use the imaging device of this unit
CN2009100077888A Active CN101526771B (en) 2008-03-03 2009-03-02 Unit using OS and image forming apparatus using the same
CN201010550444.4A Active CN102063034B (en) 2008-03-03 2009-03-02 Unit using OS and image forming apparatus using the same

Country Status (7)

Country Link
US (8) US8332934B2 (en)
EP (4) EP2250603A4 (en)
KR (7) KR101012398B1 (en)
CN (12) CN102200714B (en)
BR (4) BRPI0907869A2 (en)
RU (6) RU2452006C1 (en)
WO (4) WO2009110687A1 (en)

Families Citing this family (66)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101012398B1 (en) * 2008-03-03 2011-02-11 삼성전자주식회사 Unit using O / S and image forming apparatus using same
KR100960113B1 (en) * 2008-09-19 2010-05-27 한국전자통신연구원 High speed processing Aria encryption / decryption device
KR101158715B1 (en) * 2009-07-24 2012-06-22 삼성전자주식회사 Image forming apparatus and method for controlling lower power thereof
US8762716B2 (en) * 2009-10-15 2014-06-24 Samsung Electronics Co., Ltd. Image forming apparatus
US8422893B2 (en) 2010-01-21 2013-04-16 Samsung Electronics Co., Ltd Developer and image forming apparatus including the same
US8422908B2 (en) * 2010-01-21 2013-04-16 Samsung Electronics Co., Ltd. Developing device and image forming apparatus including the same
US8437680B2 (en) * 2010-01-25 2013-05-07 Samsung Electronics Co,. Ltd Developer and image forming apparatus including the same
CN102193473A (en) * 2010-03-16 2011-09-21 株式会社理光 Image formation device and method for preventing erroneous mounting of processing cartridge
US20110261961A1 (en) * 2010-04-22 2011-10-27 Qualcomm Incorporated Reduction in bearer setup time
US8532506B2 (en) 2010-11-29 2013-09-10 Xerox Corporation Multiple market consumable ID differentiation and validation system
US8311419B2 (en) * 2010-11-29 2012-11-13 Xerox Corporation Consumable ID differentiation and validation system with on-board processor
US9385871B2 (en) 2011-05-23 2016-07-05 Samsung Electronics Co., Ltd Method and apparatus for authenticating a non-volatile memory device
JP5824977B2 (en) * 2011-08-31 2015-12-02 株式会社リコー Key pair management program, key pair management method, and image forming apparatus
KR101780734B1 (en) 2011-09-09 2017-09-26 에스프린팅솔루션 주식회사 CRUM chip and image forming device for communicating mutually, and method thereof
US9924071B2 (en) 2011-09-09 2018-03-20 S-Printing Solution Co., Ltd. Crum chip and image forming device for authentication and communication, and methods thereof
KR101477773B1 (en) * 2012-12-24 2014-12-31 삼성전자주식회사 CRUM chip and image forming device for authenticating and communicating mutually, and methods thereof
KR101957889B1 (en) * 2011-12-20 2019-03-14 에이치피프린팅코리아 유한회사 Image forming apparatus for using consumable unit and method for certifying the consumable unit
CN103188080B (en) * 2011-12-31 2018-02-09 中兴通讯股份有限公司 A kind of machinery of consultation of key authentication end to end of identity-based mark and system
RU2494471C1 (en) * 2012-04-10 2013-09-27 Закрытое акционерное общество "Современные беспроводные технологии" Device for encrypting data according to standards gost 28147-89 and aes
JP6012237B2 (en) 2012-04-18 2016-10-25 キヤノン株式会社 Information processing apparatus, control method, and program
US9881161B2 (en) 2012-12-06 2018-01-30 S-Printing Solution Co., Ltd. System on chip to perform a secure boot, an image forming apparatus using the same, and method thereof
KR20140073384A (en) * 2012-12-06 2014-06-16 삼성전자주식회사 system on chip for performing secure boot, image forming apparatus comprising it, and methods thereof
WO2014104511A1 (en) 2012-12-24 2014-07-03 Samsung Electronics Co., Ltd. Crum chip and image forming device for authentication and communication, and methods thereof
KR101413722B1 (en) * 2013-01-08 2014-07-01 주식회사 코아리버 Smart toner security system
US11127001B2 (en) 2013-05-09 2021-09-21 Wayne Fueling Systems Llc Systems and methods for secure communication
FR3007168B1 (en) 2013-06-18 2016-10-07 Stmicroelectronics Rousset MECHANISM FOR VERIFYING THE AUTHENTICITY OF A PRODUCT
FR3007169B1 (en) 2013-06-18 2016-10-07 Stmicroelectronics Rousset METHOD OF VERIFYING THE AUTHENTICITY OF A PRODUCT
US10205596B2 (en) * 2013-07-31 2019-02-12 Hewlett-Pachard Development Company, L.P. Authenticating a consumable product based on a remaining life value
US9878555B2 (en) * 2013-08-30 2018-01-30 Hewlett-Packard Development Company, L.P. Supply authentication via timing challenge response
KR20150033895A (en) * 2013-09-25 2015-04-02 삼성전자주식회사 crum chip mauntable in comsumable unit, image forming apparatus for authentificating the crum chip, and method thereof
KR101584221B1 (en) * 2013-10-18 2016-01-19 삼성전자주식회사 crum chip, image forming device for verifying consumable unit comprising the crum chip, and methods thereof
KR20150051117A (en) * 2013-11-01 2015-05-11 삼성전자주식회사 Crum unit mountable in consumable unit of image forming apparatus and image forming apparatus using the same
US20150163954A1 (en) * 2013-12-09 2015-06-11 Silicon Graphics International Corp. Server embedded storage device
US9317009B2 (en) * 2014-02-19 2016-04-19 Xerox Corporation Systems and methods for mounting an externally readable monitoring module on a rotating customer replaceable component in an operating device
JP6398303B2 (en) * 2014-05-12 2018-10-03 ブラザー工業株式会社 Printing apparatus system, connecting apparatus for printing apparatus system, control method for printing apparatus system, and program for printing apparatus system
CN104102106B (en) * 2014-07-16 2017-08-04 广州小微电子技术有限公司 A kind of imaging cartridge verification method and its system
US10019602B2 (en) * 2014-08-28 2018-07-10 Qualcomm Incorporated System and method for improved security for a processor in a portable computing device (PCD)
US9658644B2 (en) 2014-10-06 2017-05-23 S-Printing Solution Co., Ltd. CRUM unit mountable in consumable unit of image forming apparatus and image forming apparatus using the same
FR3032540B1 (en) 2015-02-06 2018-09-07 Dover Europe Sarl ADVANCED PROTECTION SYSTEM OF CONSUMABLE OR DETACHABLE ELEMENTS
AU2016228544B2 (en) 2015-03-12 2020-01-16 Visa International Service Association Mutual authentication of software layers
US9948615B1 (en) * 2015-03-16 2018-04-17 Pure Storage, Inc. Increased storage unit encryption based on loss of trust
AU2015404868B2 (en) * 2015-07-31 2018-02-22 Hewlett-Packard Development Company, L.P. Imaging supplies
JP6569415B2 (en) * 2015-09-15 2019-09-04 株式会社リコー Display input device, image forming apparatus, electronic apparatus, display control method, and program
JP6575275B2 (en) * 2015-09-30 2019-09-18 ブラザー工業株式会社 Server device and communication system including server device
KR102376962B1 (en) * 2015-12-15 2022-03-21 삼성전자주식회사 Server, electronic device, and method for image processing in electronic device
DE102016210423A1 (en) * 2016-06-13 2017-12-14 Robert Bosch Gmbh Method and device for transmitting data
EP4131038A1 (en) * 2016-07-25 2023-02-08 Apple Inc. System for and method of authenticating a component of an electronic device
KR101866823B1 (en) * 2017-09-15 2018-07-19 에이치피프린팅코리아 주식회사 CRUM chip and image forming device for communicating mutually, and method thereof
US20190095218A1 (en) * 2017-09-26 2019-03-28 Hewlett Packard Enterprise Develepment Lp Creating or modifying artifacts on mounted operating system volumes
US10542172B2 (en) * 2018-04-13 2020-01-21 Lexmark International, Inc. Chip and supply item for imaging device, including communication
WO2019200155A1 (en) * 2018-04-13 2019-10-17 Lexmark International, Inc. Chip and supply item for imaging device, including communication
US10419641B1 (en) 2018-04-13 2019-09-17 Lexmark International, Inc. Chip and supply item for imaging device, including communication
US10375273B1 (en) 2018-04-13 2019-08-06 Lexmark International, Inc. Chip and supply item for imaging device, including communication
KR20190121611A (en) 2018-04-18 2019-10-28 휴렛-팩커드 디벨롭먼트 컴퍼니, 엘.피. Crum apparatus mountable in image forming apparatus, and image forming apparatus using the same
KR20200004613A (en) * 2018-07-04 2020-01-14 휴렛-팩커드 디벨롭먼트 컴퍼니, 엘.피. Toner refill control of image forming apparatus
CN110851183B (en) * 2018-08-20 2024-04-12 联想企业解决方案(新加坡)有限公司 Method for fast booting a processor in a multiprocessor architecture
CN109315837A (en) * 2018-09-21 2019-02-12 深圳市合元科技有限公司 Electronic cigarette control method and electronic cigarette
CN110866290A (en) * 2018-11-21 2020-03-06 哈尔滨安天科技集团股份有限公司 Chip malicious tampering detection method and device, electronic equipment and storage medium
CA3121418A1 (en) 2018-12-03 2020-06-11 Hewlett-Packard Development Company, L.P. Logic circuitry
WO2020167283A1 (en) 2019-02-11 2020-08-20 Hewlett-Packard Development Company, L.P. Recovery from corruption
CN109948329A (en) * 2019-03-13 2019-06-28 珠海奔图电子有限公司 Method and device for prompting safety information
KR102279245B1 (en) * 2019-03-29 2021-07-20 한국항공대학교산학협력단 Apparatus of encrypting for Internet-of-Things applications and method thereof
KR20220053369A (en) * 2020-10-22 2022-04-29 휴렛-팩커드 디벨롭먼트 컴퍼니, 엘.피. Controlling an image forming job performed between senders and receivers based on groups
EP4275136A4 (en) * 2021-02-12 2024-10-16 Hewlett-Packard Development Company, L.P. GENERATING A REQUEST FOR REPROCESSING A REPLACEABLE SUPPLY COMPONENT
US11818574B2 (en) * 2021-05-27 2023-11-14 Citrix Systems, Inc. Provisioning devices securely using zero touch deployments
US12254302B2 (en) * 2021-09-28 2025-03-18 Dell Products L.P. Identifying binary objects using signature of input items used to create binary object

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1377481A (en) * 1999-09-30 2002-10-30 M-系统闪光盘先锋有限公司 Removable active, personal storage device, system and method

Family Cites Families (89)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002292890A (en) * 2001-03-30 2002-10-09 Brother Ind Ltd ink cartridge
US5537517A (en) * 1991-10-23 1996-07-16 Seiko Epson Corporation Information processing device in an electronic apparatus utilizing an accessory control device and methods of application
US5666516A (en) * 1993-12-16 1997-09-09 International Business Machines Corporation Protected programmable memory cartridge having selective access circuitry
IT1292544B1 (en) 1997-04-10 1999-02-08 Microtec Srl DEVICE FOR MEASURING THE DIMENSIONS OF A VERY LONGITUDINALLY EXTENDED OBJECT WITH A CURVED CONTOUR CROSS SECTION.
US6016409A (en) 1997-04-11 2000-01-18 Xerox Corporation System for managing fuser modules in a digital printing apparatus
US6547364B2 (en) * 1997-07-12 2003-04-15 Silverbrook Research Pty Ltd Printing cartridge with an integrated circuit device
US6803989B2 (en) * 1997-07-15 2004-10-12 Silverbrook Research Pty Ltd Image printing apparatus including a microcontroller
US7249108B1 (en) * 1997-07-15 2007-07-24 Silverbrook Research Pty Ltd Validation protocol and system
US7246098B1 (en) * 1997-07-15 2007-07-17 Silverbrook Research Pty Ltd Consumable authentication protocol and system
EP1672886A3 (en) * 1998-03-05 2014-08-13 Cliff Island LLC Portable terminal
US6816968B1 (en) 1998-07-10 2004-11-09 Silverbrook Research Pty Ltd Consumable authentication protocol and system
US6494562B1 (en) 1998-09-03 2002-12-17 Hewlett-Packard Company Method and apparatus for identifying a sales channel
TW522099B (en) 1999-03-31 2003-03-01 Seiko Epson Corp Printing system, printing controller, printer, method for controlling printing operations, printing method, ink box, ink provider, and recording medium
JP2000322326A (en) * 1999-05-14 2000-11-24 Sharp Corp Backup memory information management method
EP1107573B1 (en) * 1999-12-03 2011-01-19 Canon Kabushiki Kaisha Image-forming system, control method therefor, image-forming apparatus, data processing method, and storage medium
US6854070B2 (en) * 2000-01-25 2005-02-08 Hewlett-Packard Development Company, L.P. Hot-upgrade/hot-add memory
US6351621B1 (en) * 2000-06-26 2002-02-26 Xerox Corporation Wireless interaction with memory associated with a replaceable module for office equipment
JP2002014576A (en) 2000-06-27 2002-01-18 Canon Inc Image forming apparatus, image forming method, and recording medium
US7343298B2 (en) * 2000-10-20 2008-03-11 Seiko Epson Corporation Method and system for supply of expendables
FR2816731B1 (en) * 2000-11-14 2003-01-03 Gemplus Card Int METHOD FOR LOADING AND CUSTOMIZING THE INFORMATION AND PROGRAMS LOADED IN A CHIP CARD
WO2002045449A1 (en) * 2000-11-28 2002-06-06 Nokia Corporation System and method for authentication of a roaming subscriber
US7240358B2 (en) * 2000-12-08 2007-07-03 Digital Fountain, Inc. Methods and apparatus for scheduling, serving, receiving media-on demand for clients, servers arranged according to constraints on resources
US6351618B1 (en) * 2000-12-20 2002-02-26 Xerox Corporation Method of using a security system for replaceable cartridges for printing machines
DE10108487A1 (en) 2001-02-22 2002-09-12 Giesecke & Devrient Gmbh Method and system for the distributed creation of a program for a programmable, portable data carrier
US6654252B2 (en) * 2001-07-18 2003-11-25 Hewlett-Packard Development Company, L.P. Server system with removable server cartridges
US7418344B2 (en) * 2001-08-02 2008-08-26 Sandisk Corporation Removable computer with mass storage
US20050162455A1 (en) * 2001-08-06 2005-07-28 Kia Silverbrook Printing cartridge with an integrated circuit device
US20030063311A1 (en) * 2001-10-03 2003-04-03 Covitt Marc L. Method and apparatus identifying printing supplies
US6917863B2 (en) * 2001-12-21 2005-07-12 Karl F. Milde, Jr. System for assuming and maintaining secure remote control of an aircraft
US20030123887A1 (en) * 2002-01-03 2003-07-03 Xerox Corporation Adertising from the customer replaceable unit memory of a copier or printer cartridge
JP3891004B2 (en) * 2002-02-26 2007-03-07 日本電気株式会社 Information processing system, control method of the system, and program
US20030231343A1 (en) * 2002-05-08 2003-12-18 Ayako Kobayashi Image forming apparatus, program adding method, and a recording medium
US6735399B2 (en) * 2002-05-17 2004-05-11 Xerox Corporation Post-launch process optimization of replaceable sub-assembly utilization through customer replaceable unit memory programming
US20030215248A1 (en) * 2002-05-17 2003-11-20 Xerox Corporation Machine post-launch process optimization through customer replaceable unit memory programming
US20030215247A1 (en) * 2002-05-17 2003-11-20 Xerox Corporation Post-launch process optimization of replaceable sub-assembly utilization through customer replaceable unit memory programming provided in an alternate replaceable sub-assembly
RU2268150C2 (en) 2002-07-22 2006-01-20 Корпорация "Самсунг Электроникс" Device for monitoring of ink consumption in cartridge
US6948067B2 (en) 2002-07-24 2005-09-20 Qualcomm, Inc. Efficient encryption and authentication for data processing systems
US7181572B2 (en) * 2002-12-02 2007-02-20 Silverbrook Research Pty Ltd Cache updating method and apparatus
EP1565867A1 (en) * 2003-02-21 2005-08-24 Matsushita Electric Industrial Co., Ltd. Software-management system, recording medium, and information-processing device
US20040212820A1 (en) * 2003-03-17 2004-10-28 Toshiba Tec Kabushiki Kaisha Electronic apparatus with communication function and method of transmitting data by using the apparatus
US7240995B2 (en) * 2003-05-06 2007-07-10 Lexmark International, Inc. Method of authenticating a consumable
US6895191B2 (en) * 2003-05-13 2005-05-17 Xerox Corporation Insertion verification of replaceable module of printing apparatus
US7383444B2 (en) * 2003-05-27 2008-06-03 Canon Kabushiki Kaisha Information processing system, information processing apparatus, method of controlling the information processing apparatus, disk array device, method of controlling the disk array device, method of controlling display of the disk array device, and control programs for implementing the methods
US7836308B2 (en) 2003-06-19 2010-11-16 Qualcomm Incorporated Apparatus and method for multiple function authentication device
US7197633B2 (en) * 2003-07-30 2007-03-27 Xerox Corporation Wireless machine post-launch configuration and option upgrade
US7308584B2 (en) * 2003-08-14 2007-12-11 International Business Machines Corporation System and method for securing a portable processing module
US7434053B2 (en) * 2003-08-28 2008-10-07 Hewlett-Packard Development Company, L.P. Methods and systems for providing an identification key to a printing device
JP3673793B2 (en) 2003-08-29 2005-07-20 キヤノン株式会社 Process cartridge, process cartridge mounting mechanism, and electrophotographic image forming apparatus
US7222206B2 (en) * 2003-09-18 2007-05-22 Vulcan Portals, Inc. Removable module for a portable electronic device having stand-alone and system functionality
JP4265383B2 (en) * 2003-11-14 2009-05-20 富士ゼロックス株式会社 Image forming apparatus and data read / write method
JP2004086232A (en) 2003-12-16 2004-03-18 Fuji Photo Film Co Ltd Device for inhibiting reuse of cartridge and image forming system
JP4707373B2 (en) 2003-12-16 2011-06-22 株式会社リコー Electronic device, electronic device control method, program, recording medium, management system, and replacement member
US7286774B1 (en) * 2003-12-19 2007-10-23 Cartridge Corporation Of America, Inc. Universal printer chip
US7712891B2 (en) * 2003-12-26 2010-05-11 Brother Kogyo Kabushiki Kaisha Image-forming device
KR100533835B1 (en) * 2004-01-26 2005-12-07 삼성전자주식회사 Network printer system and managing method for toner cartridge thereof
US7107502B2 (en) 2004-01-29 2006-09-12 International Business Machines Corporation Diagnostic method for detection of multiple defects in a Level Sensitive Scan Design (LSSD)
JP4766365B2 (en) * 2004-05-17 2011-09-07 富士ゼロックス株式会社 Image forming apparatus equipped with an exchange unit
JP5002120B2 (en) * 2004-05-17 2012-08-15 富士ゼロックス株式会社 Image forming apparatus and image forming system equipped with exchange unit
JP5016189B2 (en) 2004-08-03 2012-09-05 株式会社リコー Electronic device, electronic device control method, program, and recording medium
US7146114B2 (en) * 2004-10-18 2006-12-05 Xerox Corporation Systems and methods for end-of-life prediction
KR100655932B1 (en) * 2004-11-29 2006-12-11 삼성전자주식회사 Image forming apparatus, substitute product management host apparatus connected thereto and control method thereof
KR100577715B1 (en) * 2004-12-01 2006-05-10 삼성전자주식회사 Image forming apparatus and control method thereof
KR100793955B1 (en) * 2004-12-03 2008-01-16 삼성전자주식회사 An image forming apparatus, a host apparatus connected thereto, an image forming system including the same, and a control method thereof
US7401222B2 (en) * 2004-12-16 2008-07-15 Xerox Corporation Method of authentication of memory device and device therefor
US7286773B2 (en) * 2004-12-17 2007-10-23 Xerox Corporation Device identification method and system
KR100662609B1 (en) * 2004-12-30 2007-01-02 삼성전자주식회사 Printer operation control system and control method by external storage device
US7146112B2 (en) * 2005-01-13 2006-12-05 Xerox Corporation Replaceable unit monitor reader with auto polling capabilities
US7231153B2 (en) 2005-01-13 2007-06-12 Xerox Corporation Systems and methods for monitoring replaceable units
JP4970780B2 (en) 2005-03-09 2012-07-11 株式会社リコー Electronic device and exchange unit
US7840998B2 (en) * 2005-05-20 2010-11-23 Xerox Corporation System and method for authentication of replaceable modules
JP4319176B2 (en) * 2005-08-23 2009-08-26 シャープ株式会社 Network system including customer replaceable units
US7529491B2 (en) 2005-09-15 2009-05-05 Xerox Corporation Apparatus and method for adapting a machine to communicate with customer replaceable unit monitors having different interface formats
US20070079125A1 (en) * 2005-09-27 2007-04-05 Lexmark International, Inc. Interface protocol method and system
US7551859B2 (en) * 2005-09-27 2009-06-23 Steven Miller Multiple region printer chip
US7667724B2 (en) 2005-10-13 2010-02-23 Xerox Corporation Customer replaceable unit with high voltage power supply
US7997711B2 (en) * 2005-12-23 2011-08-16 Xerox Corporation Supply units having an associated electronically-readable memory device
JP4969106B2 (en) * 2006-01-05 2012-07-04 ルネサスエレクトロニクス株式会社 Microcontroller
TWI418198B (en) * 2006-01-24 2013-12-01 Stepnexus Holdings Method and system for personalizing smart cards using asymmetric key cryptography
JP2007219802A (en) * 2006-02-16 2007-08-30 Hitachi Global Storage Technologies Netherlands Bv Storage device, controller thereof, and control method thereof
JP2007328438A (en) 2006-06-06 2007-12-20 Seiko Epson Corp Information processing apparatus and data backup and recovery method thereof
US20080034440A1 (en) * 2006-07-07 2008-02-07 Michael Holtzman Content Control System Using Versatile Control Structure
JP4321562B2 (en) * 2006-08-08 2009-08-26 セイコーエプソン株式会社 Liquid container
US7987375B2 (en) * 2006-11-20 2011-07-26 Canon Kabushiki Kaisha Communication apparatus, control method thereof and computer readable medium
US7526215B2 (en) * 2007-01-25 2009-04-28 Xerox Corporation Reserve life run-on feature for customer replaceable units
JP4857201B2 (en) * 2007-06-20 2012-01-18 キヤノン株式会社 Information processing device
JP5095325B2 (en) * 2007-09-14 2012-12-12 株式会社リコー Image processing apparatus and image processing method
JP4963461B2 (en) * 2007-11-02 2012-06-27 株式会社リコー Image forming apparatus, program, and printing suppression method
KR101198771B1 (en) * 2008-01-09 2012-11-12 삼성전자주식회사 Image forming apparatus and method the same
KR101012398B1 (en) * 2008-03-03 2011-02-11 삼성전자주식회사 Unit using O / S and image forming apparatus using same

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1377481A (en) * 1999-09-30 2002-10-30 M-系统闪光盘先锋有限公司 Removable active, personal storage device, system and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
JP特开2005-202364A 2005.07.28

Also Published As

Publication number Publication date
RU2611014C2 (en) 2017-02-17
CN101526796B (en) 2013-08-21
RU2012132973A (en) 2014-02-20
BRPI0909684A2 (en) 2016-09-27
US20090220077A1 (en) 2009-09-03
BRPI0909683A2 (en) 2015-09-22
US9203980B2 (en) 2015-12-01
CN101527767A (en) 2009-09-09
BRPI0909781A8 (en) 2018-12-18
KR20090094729A (en) 2009-09-08
KR20110014536A (en) 2011-02-11
WO2009110691A1 (en) 2009-09-11
US8332934B2 (en) 2012-12-11
US8330966B2 (en) 2012-12-11
EP2250605A4 (en) 2012-03-21
KR100997879B1 (en) 2010-12-07
CN101526772B (en) 2013-08-14
RU2452009C1 (en) 2012-05-27
CN102073236A (en) 2011-05-25
US20110004768A1 (en) 2011-01-06
EP2250603A4 (en) 2011-04-06
RU2012132972A (en) 2014-02-20
RU2010136823A (en) 2012-03-20
EP2250602A1 (en) 2010-11-17
US20090222664A1 (en) 2009-09-03
CN101526771A (en) 2009-09-09
CN102682238B (en) 2015-04-15
CN102200714B (en) 2014-07-30
EP2250600A1 (en) 2010-11-17
RU2010136826A (en) 2012-03-10
CN103345134B (en) 2016-01-20
KR20110014535A (en) 2011-02-11
RU2471229C2 (en) 2012-12-27
US20110002002A1 (en) 2011-01-06
KR20090094727A (en) 2009-09-08
US8453260B2 (en) 2013-05-28
US20130070301A1 (en) 2013-03-21
BRPI0907869A2 (en) 2015-07-21
RU2010136824A (en) 2012-03-10
CN102073237B (en) 2014-10-01
US8069478B2 (en) 2011-11-29
RU2010136825A (en) 2012-03-10
CN102073237A (en) 2011-05-25
KR20090094728A (en) 2009-09-08
CN102063031B (en) 2015-09-30
BRPI0909781B1 (en) 2020-12-01
KR101123695B1 (en) 2012-03-16
US20110004746A1 (en) 2011-01-06
CN102213924B (en) 2014-03-19
RU2598331C2 (en) 2016-09-20
CN101527767B (en) 2013-03-13
RU2463655C2 (en) 2012-10-10
CN102213924A (en) 2011-10-12
KR100997239B1 (en) 2010-11-29
BRPI0909781A2 (en) 2017-11-07
CN102063034B (en) 2014-06-11
KR101012398B1 (en) 2011-02-11
CN103345134A (en) 2013-10-09
CN101526772A (en) 2009-09-09
EP2250600A4 (en) 2011-04-06
EP2250605A1 (en) 2010-11-17
EP2250602A4 (en) 2011-04-06
US8069477B2 (en) 2011-11-29
US8386781B2 (en) 2013-02-26
KR101018387B1 (en) 2011-03-02
KR100997238B1 (en) 2010-11-29
EP2250605B1 (en) 2015-04-01
EP2250603A1 (en) 2010-11-17
CN102063031A (en) 2011-05-18
WO2009110687A1 (en) 2009-09-11
CN102200714A (en) 2011-09-28
RU2452006C1 (en) 2012-05-27
BRPI0909683B1 (en) 2020-03-10
CN101526771B (en) 2013-01-02
KR20110014537A (en) 2011-02-11
US8176549B2 (en) 2012-05-08
CN102063034A (en) 2011-05-18
CN102682238A (en) 2012-09-19
WO2009110692A1 (en) 2009-09-11
CN101526796A (en) 2009-09-09
KR20090094726A (en) 2009-09-08
US20090222886A1 (en) 2009-09-03
US20090219559A1 (en) 2009-09-03
WO2009110693A1 (en) 2009-09-11

Similar Documents

Publication Publication Date Title
CN102073236B (en) Unit using operating system and image forming apparatus using the same
BRPI0909684B1 (en) IMAGE TRAINING APPARATUS, CRUM UNIT, REPLACABLE UNIT AND METHOD FOR REPORTING ENCRYPTED DATA

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20170302

Address after: Gyeonggi Do Korea Suwon

Patentee after: Ace Print Solutions Ltd

Address before: Gyeonggi Do Korea Suwon

Patentee before: Samsung Electronics Co., Ltd.

CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: Gyeonggi Do Korea Suwon

Patentee after: HP printer Korea Co., Ltd.

Address before: Gyeonggi Do Korea Suwon

Patentee before: Ace Print Solutions Ltd

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20191120

Address after: American Texas

Patentee after: Hewlett-Packard Development Corporation, Limited Liability Partnership

Address before: Gyeonggi Do Korea Suwon

Patentee before: HP printer Korea Co., Ltd.